<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:g-custom="http://base.google.com/cns/1.0" xmlns:media="http://search.yahoo.com/mrss/" version="2.0">
  <channel>
    <title>Cytellix</title>
    <link>http://www.cytellix.com</link>
    <description>Cybercriminals will stop at almost nothing to get the data they're after. That being said, there are a few devices that are more at-risk of attack than others simply based on the nature of the device. Today, the Cytellix team wasnt to discuss three of the most at-risk devices so that you can better prepare them against cybercrime.</description>
    <atom:link href="http://www.cytellix.com/feed/rss2" type="application/rss+xml" rel="self" />
    <image>
      <title>Cytellix</title>
      <url>https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5240546.jpeg</url>
      <link>http://www.cytellix.com</link>
    </image>
    <item>
      <title>MSP SPOTLIGHT: Go Beyond Baseline Security.</title>
      <link>http://www.cytellix.com/msp-spotlight-go-beyond-baseline-security</link>
      <description>Explore the challenges MSPs face in providing holistic cybersecurity support to their SMB clients and discuss how a programmatic-optimized approach can help bridge the gap, ensuring enterprise-level protection without breaking the bank for SMBs, while adding revenue opportunities for MSPs.</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/shutterstock_2206857273+%281%29.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           94% of MSP clients say they would switch MSPs for a better Cybersecurity solution
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;sup&gt;&#xD;
      
           1
          &#xD;
    &lt;/sup&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Introduction
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As an MSP, you serve a crucial role as a technology partner to small and medium-sized businesses (SMBs), giving them the peace of mind that their business is running efficiently. However, the evolving threat landscape and required digital initiatives have increased the exposure of SMBs to cyber risks, necessitating a higher level of protection, one they may not even realize they need. This blog will explore the challenges MSPs face in providing holistic cybersecurity support to their SMB clients and discuss how a programmatic-optimized approach can help bridge the gap, ensuring enterprise-level protection without breaking the bank for SMBs, while adding revenue opportunities for MSPs.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Current MSP Model
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           MSPs are indispensable for SMBs, offering valuable IT services and tech strategies that give them the luxury to focus on their core business functions. As cyber threats become more sophisticated, SMBs find themselves in the crosshairs of cybercriminals. In response, they turn to their trusted MSP partners for support and protection. Innovative MSPs are meeting this challenge head-on, offering many of the core cybersecurity technologies as a baseline. But even the most diligent efforts present cost and execution challenges. MSPs have an opportunity to expand their services for SMBs and amp up the level of protection. Increased complexities in the threat landscape along with mounting compliance regulations and disparate technologies have left MSPs in information overload on knowing how best (and easily) they can bring those services to market for their customers.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What are SMB clients asking for?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            SMBs, like larger enterprises, face a constant barrage of cyber threats and often must adhere to compliance requirements. In fact, the impact of cyber attacks as a percentage of revenue for SMBs is actually larger than enterprises. They also face exactly the same challenges as enterprises; limited budgets, lack of resources, and a shortage of specialized expertise. This leaves SMBs vulnerable to regulatory fines and a prime target for cyber attacks. For instance, according to the Ransomware Taskforce
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.npr.org/2022/08/12/1116936751/what-experts-think-companies-should-do-when-ransomware-strikes" target="_blank"&gt;&#xD;
      
           businesses with fewer than 500 employees were hit by 70% of the ransomware attacks
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            in 2021.)
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Given the maturity of enterprise cyber programs in today’s landscape, hackers are setting their sights on SMBs as they will likely be easier to penetrate, not to mention having more at stake for a breach and possibly more likely to give in to demands. As these attacks are proliferating, SMBs are left asking “How do I manage my cyber risk without breaking the bank?”
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           2 Distinct, But Interconnected Sides of the Coin
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Much like enterprises, and as noted above, SMBs not only have threats to contend with but also adherence to compliance mandates. Regulatory compliance is oftentimes more critical for an SMB depending on their industry or how they fit into part of a supply chain, for example, if they are doing business with the DoD and must comply with CMMC. They typically would need a divide-and-conquer approach (with an already small team) to handle compliance readiness and threat management as two distinct initiatives. This adds an additional strain on already sparse resources and skill sets, plus added tech investments to support both sides of that coin. An integrated approach to Governance, Risk Management, and Compliance (GRC) and Managed Detection and Response (MDR) or Extended Detection and Response (XDR) both from a programmatic and tech perspective can be much more advantageous to any organization, SMB or otherwise.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           MSPs Face Challenges as Well
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           MSPs, while committed to providing cybersecurity support, encounter their own set of challenges. They manage multiple clients with diverse complexities related to threats, attacks, and compliance requirements. Their current approach often relies on point solutions such as endpoint security, firewalls, identity management, and compliance tools. However, these fragmented tools offer only a patchwork stopgap solution, are expensive to maintain, and are difficult to scale. Moreover, disparate tools do not provide the holistic visibility required to assess their clients' overall security posture and compliance status.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           MSPs are left grappling with critical questions:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            What should our first action be in response to a cyber incident?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            What specific cyber and compliance pain points are our clients facing?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Where are the security and compliance gaps in our clients' infrastructure?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            How can the limited resources of SMBs be leveraged to achieve the best outcomes (after all, great security programs require action on the customer’s part!)?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Where are their security/compliance gaps?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            How can we help to reduce their cyber/compliance risk…?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
            Time to Rethink: How can we better serve our SMB clients?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To address the challenges faced by SMBs and MSPs alike, a paradigm shift is necessary. Instead of relying solely on point solutions, MSPs should adopt a programmatic approach to managed services. This approach offers a multitude of benefits, including:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Better Visibility and Enhanced Protection
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           : A programmatic approach allows you to gain comprehensive visibility into your clients' network and security environment, enabling you to offer better protection against cyber threats.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Reducing Cyber and Compliance Risk
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           : By gaining a holistic view of your clients' infrastructure, you can clearly and easily isolate gaps – and address how to close them. You can identify vulnerabilities, provide actionable insights, and help your clients implement effective cybersecurity strategies.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Increasing Bottom-line Revenue
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           : Understanding the specific gaps and requirements of your clients allows you to streamline workloads and offer tailored services. This, in turn, leads to increased revenue and long-term client satisfaction.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Gaining a Competitive Edge
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           : Adopting an advanced cybersecurity approach will set you apart from your competitors. Clients are more likely to choose MSPs that can provide comprehensive protection and strategic guidance, and approach cyber risk from both a business and technical lens.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Enterprise-Level Protection at a Fraction of the Cost
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           : With a programmatic approach, you can offer SMB clients enterprise-level protection without the need for exorbitant investments in multiple point solutions, or plug into what you already have in place to maximize existing investments.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Future of Cybersecurity for MSPs. Give your SMB clients the enterprise-level cybersecurity protection they need.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           MSPs must evolve their cybersecurity support for SMBs to address the growing threat landscape effectively. By shifting from a fragmented approach to a programmatic model, MSPs can offer better protection, reduce cyber risk, increase revenue, and gain a competitive edge.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            GRC + MDR/XDR. Cost effective. Easy to implement.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           For MSPs looking for a turnkey solution to provide enterprise-level protection easily and affordably, Cytellix offers a comprehensive cybersecurity platform with its Cytellix Cyber Watch Platform (CCWP™). It is the ONLY place where GRC and MDR/XDR are delivered as a single integrated solution for a holistic, real-time, view of your client’s cybersecurity posture. Cytellix was recently recognized as a sample vendor in the Gartner® Hype Cycle™ for Cyber Risk Management, 2023. Cytellix's advanced capabilities empower MSPs to deliver integrated cybersecurity and compliance support, making them invaluable partners for their SMB clients.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In a world where cyber threats continue to evolve, MSPs play a crucial role in safeguarding SMBs. By embracing innovation and adopting a programmatic-optimized approach, MSPs can ensure that their clients receive the protection they need without straining their budgets. The time to act is now, and with Cytellix, MSPs can be the trusted cybersecurity allies that SMBs rely on to navigate the digital landscape securely while growing their business.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;sup&gt;&#xD;
      
           1
          &#xD;
    &lt;/sup&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Source: Vanson Borne Report - The State of SMB Cybersecurity in 2022
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/shutterstock_2206857273+%281%29.jpg" length="55334" type="image/jpeg" />
      <pubDate>Wed, 30 Aug 2023 16:51:44 GMT</pubDate>
      <guid>http://www.cytellix.com/msp-spotlight-go-beyond-baseline-security</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/shutterstock_2206857273+%281%29.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/shutterstock_2206857273+%281%29.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>The Clock is Ticking for CMMC 2.0: Here’s Everything You Need to Know – START NOW</title>
      <link>http://www.cytellix.com/the-clock-is-ticking-for-cmmc-2-0-heres-everything-you-need-to-know-start-now</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/Shutterstock_213699463+%281%29.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Department of Defense (DoD) has formally presented the CMMC regulation for official evaluation, marking the start of its journey toward formal announcement. Every regulation proposed by the executive branch, including this one, undergoes scrutiny by OIRA, a division of the Office of Management and Budget (OMB). The significance of this step is that the previously mentioned "delays" in the CMMC process were due to the time taken for the DoD to forward the rule to OIRA. With this action now taken, the subsequent stages of the rulemaking procedure are underway. Nevertheless, due to the intricate nature of federal rulemaking, several more stages need to be navigated before the CMMC becomes a part of contracts.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The following scenarios should be considered for preparation for compliance and certification for the Defense Industrial Base (DIB).
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Scenario 1: Proposed Rule
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Submission to OIRA: The Department of Defense (DoD) has officially submitted the CMMC rule for regulatory review to the Office of Information and Regulatory Affairs (OIRA).
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Review and Publication: After OIRA's review, which takes an average of 66 business days, the
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            CMMC rule is expected to be published in late October 2023.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Public Comment Period: A standard 60-day public comment period will follow, ending in December 2023.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Finalization: The CMMC rule will be published as a "proposed rule", which means it will only become effective after the agency responds to public comments in a final rule. Based on historical data, the average time for DoD proposed rules to be published as final rules is 333 business days.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            This means the CMMC final rule is expected between February and April 2025
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            .
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Phased Roll-Out: The DoD plans a 3-year phased roll-out for CMMC contract clauses. Assuming the final rule is published in Q1 2025, all relevant DoD contracts will contain CMMC by 2028.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
             Scenario 2: Interim Final Rule
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Immediate Effectiveness
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             :
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            If the CMMC rule is published as an "interim final rule", it will be effective before the agency responds to public comments
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             .
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            This means the rule would be in effect and appear in contracts in Q1 2024
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            .
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Rarity of Interim Final Rules: Such rules are rare and bypass the usual democratic process of "notice and comment" rulemaking. They are typically granted in urgent situations, like the need to enhance national security.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           So when should you start preparing?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Before we start with the background and changes, let’s talk about the "Big Elephant” in the room. Clearly, the updated compliance and certification process developed by the DoD and the non-profit organization liaisons has been long overdue with a lot of anticipated deadlines that never materialized. And with the latest announcements it does seem to be mildly reminiscent of the movie comedy and colloquial meaning of Groundhog Day. Since the Library of Congress selected the film for preservation in the National Film Registry I found humor in relativity, not cynicism. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Opinion: This is different and the information we have in the DoD supply chain must be protected from our adversaries. This is a serious issue and needs clear and precise guidelines as the supply chain will not spend money on the protection of the information that protects national security unless they must as it is deemed as a complex undertaking. That’s an unfortunate reality. We have seen the start and restart of the cyber programs for DoD for the past 5-years, what makes this different?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The implementation of the CMMC rule in contracts will be phased in over a period of 3 years, with all relevant DoD Defense Industrial Base (DIB) contracts containing CMMC by 2028. For a company with 50-100 employees operating in the DoD supply chain, it takes an average of 12-18 months to prepare for assessment and audit for eventual certification, with certification being the ultimate requirement for compliance. Therefore, the time is now to start the process if you plan to hold government contracts in 2024/2025. There are also varied flow down requirements that need to also be taken into consideration.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Understanding Plan of Action and Milestones (POAM)
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           There is now the ability to present interim status vs 100% compliance as we have with the current DFARS and NIST requirements. These interim reports can be handled in the traditional manner by presenting a Plan of Action and Milestones (POAM) that have a less than 180-day completion date for allowed baseline gaps. Unallowed gaps will have a “No POAM” designation and need to be implemented. If you have any doubts, work with a highly skilled 3
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;sup&gt;&#xD;
      
           rd
          &#xD;
    &lt;/sup&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            party who has expertise in these standards and a track record of enabling comprehensive successful standards-based cyber programs. The information presented by the suppliers in POAM’s or claiming 100% compliance will be evaluated and can and will likely trigger audits if certain high-level cyber controls are not met or the 100% compliance score creates suspicion of a false claim. Be careful to present accurate and validated information.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           So, what does this all mean? 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           You must be compliant with DFARS clause 252.204.7012 and NIST 800-171 today. This is a requirement of your current contracts, and the False Claims Act applies to all cyber compliance representations. If you are not compliant, you could be subject to civil penalties and criminal charges.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           You need to start preparing for CMMC 2.0 today. The deadline for the final rule is 18 months from now, and it will take an average company in the DoD supply chain 12-18 months to become assessment ready. Waiting is not an option. Waiting is a bad idea. Why you ask? It is very clear that most suppliers and Small and Medium Businesses are not cyber ready and nowhere near compliant with any cyber framework. The timeframe for a typical business to understand, develop and implement full compliance is more than 1-year assuming they have the skills and personnel to complete the objectives.  CMMC 2.0 clearly aligns with DFARS and NIST, so it is the best way to protect your organization's sensitive data. Don't delay, start preparing today!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            *If you have any questions, please reach out to our experts –
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="mailto:info@cytellix.com"&gt;&#xD;
      
           info@cytellix.com
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/Shutterstock_213699463+%281%29.jpg" length="135047" type="image/jpeg" />
      <pubDate>Wed, 23 Aug 2023 16:30:02 GMT</pubDate>
      <author>bberger@cytellix.com (Brian Berger)</author>
      <guid>http://www.cytellix.com/the-clock-is-ticking-for-cmmc-2-0-heres-everything-you-need-to-know-start-now</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/Shutterstock_213699463+%281%29.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/Shutterstock_213699463+%281%29.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cytellix® Names Security Industry Veteran Walt Czerminski as CEO</title>
      <link>http://www.cytellix.com/cytellix-names-security-industry-veteran-walt-czerminski-as-ceo</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Seasoned C-suite executive brings over 25 years of leadership experience to drive growth of Cytellix's revolutionary SaaS cybersecurity platform.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/CYT+B+2+Alpha.gif"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ALISO VIEJO, Calif., Nov. 30, 2022 /PRNewswire/ -- Cytellix®, a cybersecurity SaaS and managed services company focused on integrated GRC and XDR, announced today that veteran cybersecurity technology executive Walt Czerminski has been appointed as CEO. Brian Berger, who has led and grown Cytellix as President and CEO from its conceptional vision to a now award winning patented innovative SaaS platform company, will continue as President and Board Member, working with Walt to strategically grow Cytellix world-class products and services. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Czerminski brings over 25 years of executive experience and has built out the technology organization for several industry-leading companies. A seasoned executive and security expert, Czerminski has held CIO, CTO, and CISO executive roles at companies including State Street Bank, EmpathIQ, Brown Brothers Harriman, Brandes Investment Partners, CP Consulting Group, and EY. He previously served in an advisory role for Cytellix and will now lead the company into its next wave of development and growth.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           "We are excited to have Walt join our team bringing a wealth of executive experience and "know how" to lead Cytellix through its next phase of growth. Cytellix has developed a unique and robust turnkey cybersecurity platform which provides a new way to manage and deploy real-time cybersecurity capabilities. With Walt's leadership we are looking forward to increase awareness, new partnerships and substantial growth." said Founder and Chairwoman, Martha Daniel. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Cytellix Cyber Watch Portal (C-CWP™), which recently released version 3.0, is a first-of-its-kind cybersecurity SaaS platform that brings together best practices, compliance, risk management, and managed detection response under one umbrella. By integrating leading MDR/XDR controls with GRC drivers, clients can know their real-time security posture and uncover enhancements for managing and deploying cybersecurity capabilities, risk awareness, and compliance – all tailored to their specific environment and needs.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           "I am thrilled to work with the team at Cytellix," said Walt Czerminski, CEO. "The rise of GRC has become a major driver of cybersecurity programs. I am confident Cytellix's patented C-CWP platform will shape the future of the cyber industry and vastly improve the outcomes clients can achieve. I look forward to guiding the company, and our clients, on that journey."
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Cytellix patented SaaS platform leverages the power of Artificial Intelligence (AI) and Machine Learning (ML) to deliver a full spectrum of cybersecurity technology, compliance, and risk management solutions to clients. Cytellix proactively identifies, detects and responds to threats in any environment, while creating real-time, actionable insights on cyber risks. Cytellix gives clients peace of mind knowing that their cybersecurity program is always on and continuously optimizing.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To learn more about Cytellix, or to schedule a demo, visit 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://c212.net/c/link/?t=0&amp;amp;l=en&amp;amp;o=3722592-1&amp;amp;h=3485525070&amp;amp;u=https%3A%2F%2Fwww.cytellix.com%2F&amp;amp;a=cytellix.com" target="_blank"&gt;&#xD;
      
           cytellix.com
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           About Cytellix
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cytellix is a first-of-its-kind, patented SaaS platform that brings together cybersecurity, compliance and risk management under one, fully integrated, umbrella. They know their clients' "real security posture" and can provide new ways to manage and deploy cybersecurity capabilities, risk awareness and compliance with a plan tailored to their clients' specific situation and needs.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Press Contact
           &#xD;
      &lt;br/&gt;&#xD;
      
           Name- Greg Clawson
           &#xD;
      &lt;br/&gt;&#xD;
      
           Email- 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="mailto:gclawson@cytellix.com" target="_blank"&gt;&#xD;
      
           gclawson@cytellix.com
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           W
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           e
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           bsite-
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://c212.net/c/link/?t=0&amp;amp;l=en&amp;amp;o=3722592-1&amp;amp;h=3271502828&amp;amp;u=https%3A%2F%2Fwww.cytellix.com%2F&amp;amp;a=www.cytellix.com" target="_blank"&gt;&#xD;
      
           www.cytellix.com
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           SOURCE Cytellix
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 30 Nov 2022 17:53:48 GMT</pubDate>
      <guid>http://www.cytellix.com/cytellix-names-security-industry-veteran-walt-czerminski-as-ceo</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Top 3 Signs Your Cybersecurity Isn't Up To Snuff</title>
      <link>http://www.cytellix.com/top-3-signs-your-cybersecurity-isn-t-up-to-snuff</link>
      <description>Cybersecurity is crucial for companies across nearly every industry. Sensitive information and data is stored online or in a cloud, and it's up to you to protect it. How can you know if your business is taking the right cybersecurity measures? Here are three red flags to look for that will let you know that your security isn't up to snuff.</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/md/pexels/dms3rep/multi/security-protection-anti-virus-software-60504.jpeg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Technology is a magical thing. Thanks to its advancement, we can now store billions of data sets in the cloud that can be accessed from just about anywhere. Businesses have quickly started to rely on clouds, networks, the Internet of Things, and more to keep their processes streamlined. Though it is a wonderful thing, this cloud-based business world does have its downfalls. Cybercriminals have been cracking codes and profiting from weak security solutions for years. Many businesses don't realize they're in danger of attack until it's too late. Here are three signs that suggest your company's cybersecurity isn't up to snuff.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Your Network is Not Secure
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The first red flag to look out for is your network. Firstly, does your company have their own private network? If you do, is it secure? Many business owners are lulled into a false sense of security because nearly all networks are classified as "secure." What they don't realize is that there are many,
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           many
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            different levels of security when it comes to networks. The most secure networks have many layers of security protocols in place at the edge of the network and throughout it. Here are a few things to look for:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Firewalls
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Anti-virus and anti-malware software
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Network segmentation
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Access control
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Secure cloud storage
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Data loss prevention plans and systems
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Virtual Private Networks (VPN)
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            There are many more moving parts to a truly secure network, but these are some of the fastest and easiest to spot. If you're missing any of these key players, chances are good that your network isn't as secure as you might think.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/Cytellix-Cyber-Watch-Portal-CCWP"&gt;&#xD;
      
           Network Situational Awareness
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            is key to understanding and protecting your infrastructure from cybercriminals. You should have a continuous view of the entire network to spot any abnormal happenings or unusual behavior analytics. The more safeguards you have for your network, the harder it will be for unauthorized visitors to get their hands on your sensitive data. Network Situational Awareness is absolutely key to protecting your business. Do a deep dive into your network to see if you have everything you need to make it truly secure. If you wind weak spots or blind spots, it's time to call in the experts to help you better your system. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           You Do Not Have A Cybersecurity Continuous Monitoring System
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Another immediate red flag to look out for is lack of continuous monitoring solutions.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/Cytellix-Governance-Risk-Compliance-GRC"&gt;&#xD;
      
           Cybersecurity continuous monitoring
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            enables awareness capabilities to quickly access a stream of real-time data reflecting the state of risk to your security posture, the network, endpoints, and even cloud devices and applications. Cytellix has created an all-in-one, 360-degree view of the entire company called the Cytellix Cyber Watch Portal
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/Cytellix-Cyber-Watch-Portal-CCWP"&gt;&#xD;
      
           (CCWP)
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . This always-on solution acts as a visibility dashboard, allowing you to see all aspects of the company from one view. It will monitor behaviors, network security, new devices, potential weaknesses, and more for you and can even implement solutions on your behalf. The Cytellix Cyber Watch Portal keeps an eye on everything so that you don't have to. When you have continuous cybersecurity monitoring, you'll find abnormalities or new weaknesses almost immediately so that you can make corrections as needed. The stronger your monitoring system, the less likely you are to suffer a cyberattack. To put into perspective exactly how much a solution like the Cytellix Cyber Watch Portal can help, let's look at what it has to offer:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Quickly identify a
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            steady-state
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             that is used as a baseline for what is normal within the system.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Patrol and protect
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            endpoints and perimeters.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Detect
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            breaches
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             as soon as they occur.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Adapt to changing environmental infrastructure to
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            tune and refine results
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            .
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Report, map, and visualize data from the entire business. A visual expression of your network and current IT infrastructure. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Alert and warn
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             about anomalies and prioritize them by urgency. 
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Receive visibility of every device
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            , and every connection, on your network, so you have a complete and accurate inventory of all routes and appliances that run on it.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           It's Been Awhile Since You've Assessed Risk And Compliance
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The last thing you want to look for to determine if your cybersecurity measures are adequate is how often you assess risk and compliance to security regulations. If your company can't remember the last time these things were looked at, you're likely at risk for cyberattack. Frequently assessing your performance is key to spotting issues and patching holes before they become problems. Managing risk can be a huge undertaking, especially if you work with third-party vendors. If you're looking to accurately assess the risk involved with your current infrastructure, call in the experts like the Cytellix team!
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/Cytellix-Governance-Risk-Compliance-GRC"&gt;&#xD;
      
           Governance and Risk Management Solution
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            will measure and "rank" an organization or family of organizations cybersecurity posture to ensure that they are not a weak link in your security system. Cytellix can identify high-risk 3rd parties, assess their cyber risk, potential vulnerability impact, and monitor controls to keep risk low.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           While you're assessing risk, you may as well assess your compliance to cybersecurity regulations as well. Professionals like Cytellix can handle that for you as well. We will take a look at your cybersecurity solutions to make sure you are in compliance with industry standard frameworks  such as: ISO27000, NIST CSF, PCI, SEC, NIST-800-171 and CMMC and others. Regulated industries are required regulations, so it's good to get a jumpstart on preparing now. We will assess your current system and offer suggestions to help you meet standards. We can even help you design, build, and implement new solutions that we suggest based on our assessment. When you have a better understanding of risk and your current cybersecurity standards, it's easier to prepare for the future and improve the business. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
            There are, of course, many other indicators that your cybersecurity is not up to par, but these three are some of the most fundamental and easiest to spot. When in doubt, it's always a good idea to contact experts in the field who can do a complete scan of your infrastructure and let you know what you're doing well with and what needs improvement. Cytellix has helped hundreds of companies improve their cybersecurity and we can help you too! Contact our team at (949) 215-8889 or leave us a message at https://www.cytellix.com/contact.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="mailto:info@cytellix.com" target="_blank"&gt;&#xD;
      
           We look forward to hearing from you soon. 
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/CYT+B+2+Alpha.gif" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.cytellix.com/" target="_blank"&gt;&#xD;
      
           Cytellix
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://www.cytellix.com/" target="_blank"&gt;&#xD;
      
           has expert capabilities in cybersecurity technology, risk management frameworks (RMF, NIST, CMMC, GDPR, FFIEC, ISO) and provides a complete visibility platform that supports: DoD customers, DIB Customers, DoD Supply Chain, and other highly regulated industries (Finance, Automotive, Life Science, Utilities, State and Local Government).  Our technology stack includes
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="/Cytellix-Governance-Risk-Compliance-GRC?ed=true"&gt;&#xD;
      
           GRC
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://www.cytellix.com/" target="_blank"&gt;&#xD;
      
           ,
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="/Cytellix-Endpoint-Detection-Response-EDR?ed=true"&gt;&#xD;
      
           EDR
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://www.cytellix.com/" target="_blank"&gt;&#xD;
      
           ,
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="/Cytellix-Managed-Detection-Response-MDR?ed=true"&gt;&#xD;
      
           MDR
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://www.cytellix.com/" target="_blank"&gt;&#xD;
      
           ,
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="/Cytellix-Extended-Detection-Response-XDR?ed=true"&gt;&#xD;
      
           XDR
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://www.cytellix.com/" target="_blank"&gt;&#xD;
      
           ,
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="/Cytellix-Security-Information-Event-Management-SIEM?ed=true"&gt;&#xD;
      
           SIEM
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://www.cytellix.com/" target="_blank"&gt;&#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://www.cytellix.com/" target="_blank"&gt;&#xD;
      
           as Service, 24x7 SOC, Vulnerability Management, Real-time continuous cyber monitoring, Firewall Management, and threat hunting and threat correlation.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/security-protection-anti-virus-software-60504.jpeg" length="265831" type="image/jpeg" />
      <pubDate>Thu, 15 Sep 2022 16:13:20 GMT</pubDate>
      <author>bberger@cytellix.com (Brian Berger)</author>
      <guid>http://www.cytellix.com/top-3-signs-your-cybersecurity-isn-t-up-to-snuff</guid>
      <g-custom:tags type="string">Cytellix,News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/security-protection-anti-virus-software-60504.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/security-protection-anti-virus-software-60504.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Which Devices Are Most At-Risk For Cyber Attack?</title>
      <link>http://www.cytellix.com/which-devices-are-most-at-risk-for-cyber-attack</link>
      <description>Cybercriminals will stop at almost nothing to get the data they're after. That being said, there are a few devices that are more at-risk of attack than others simply based on the nature of the device. Today, the Cytellix team wants to discuss three of the most at-risk devices so that you can better prepare them against cybercrime.</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5240546.jpeg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cybercriminals are no dummies. They often have a background in some sort of computer science or software development in preparation for cyber attacks. To break through codes, you need to be at least a little clever. Because they're smart, it makes sense that they find trends and ride them. For example, if they notice that a particular type of device is easier to hack into, they will likely stick to those types of attacks. Unfortunately, nearly all devices can be hacked, but some are much more common than others. Let's talk about three of the devices you're likely in close contact with that are at risk of data breach or cyber attack. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Laptops/Computers
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            First on our list is a household and workplace staple - laptops or computers. Think about how frequently you use a laptop for personal things outside of work, and how vital computers are to your job. There are billions of laptops or computers in the world today, each posing an opportunity for attack. Hackers will go after personal laptops to find passwords, sensitive information, access to various accounts, credit card information, location, interests, and more. Work or company laptops will usually contain all of this information
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           and
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            sensitive data about the company including passwords, protocols, client information, finances,  IP, future plans, etc. There's a lot of valuable information on computers and cybercriminals are very aware of it. Laptops are particularly at risk if the owner uses an unsecure network/hotspots or stores data on an ill-protected cloud. Network situational awareness is key to spot weak points and catch a hacker in the act.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Smartphones
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Smartphones are typically with their owners at all times. People have an arguably unhealthy attachment to their phones in some cases, and rely on it for all kinds of things. Your phone can be an alarm, a calendar, a GPS, a form of communication, a pocket-sized computer, and more. Many people store information in their phones or utilize apps like mobile wallets, mobile banking, password vaults, and more. Especially due to the prevalence of remote working, many companies provide employees with a "work phone." or subsidize mobile phone use of a personal device.  As with laptops, these mobile devices tend to have at least some sensitive information in them from contacts to documents to emails and more. Cybercriminals will happily steal data from either your personal or work phone, so be sure to have the proper precautions in place. Avoid using public wifi networks (especially on work phones), require 2-Factor Authentication whenever possible, and always check on app permissions about sharing data. It's also wise to never store passwords or confidential information in your phone, and secure it with a passcode and/or facial recognition. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Point Of Sales Systems
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The last device is not something you'll have at home, but it is something that any retail worker comes across. A point of sales system is where payment processing occurs. Credit card readers, checkout registers, self-checkout, etc. all fall under this umbrella. Considering that the main purpose of POS systems is to carry out transactions, they are a big target for cyber attack. A successful breach of a POS system will give the hacker access to bank information, contact information, and other valuable details about the company and every customer. We've all heard about huge retailers becoming victims of a POS breach, and thousands or millions of customers are affected. These breaches are extremely costly and have been known to ruin a store's reputation.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
            Cytellix can help your business protect any and all devices included in your IT infrastructure. We set up
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/Cytellix-Cyber-Watch-Portal-CCWP"&gt;&#xD;
      
           continuous cybersecurity monitoring,
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            endpoint detection and response
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/Cytellix-Endpoint-Detection-Response-EDR"&gt;&#xD;
      
           (EDR)
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            that tracks all processes, detects attacks within the network as well as any endpoints (devices). Our personalized solutions will secure devices from attack, even for employees working from home. We can also secure your network, enforce the cloud, and detect any odd behavior as soon as it occurs. Speed is essential to stopping an attack, and we make it easier to react almost immediately. Learn more about Cytellix at
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://cytellix.com/" target="_blank"&gt;&#xD;
      
           https://cytellix.com/
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            and contact us at
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="mailto:info@cytellix.com" target="_blank"&gt;&#xD;
      
           info@cytellix.com
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            to get started!
            &#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/CYT+B+2+Alpha.gif" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.cytellix.com/" target="_blank"&gt;&#xD;
      
           Cytellix
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.cytellix.com/" target="_blank"&gt;&#xD;
      
           has expert capabilities in cybersecurity technology, risk management frameworks (RMF, NIST, CMMC, GDPR, FFIEC, ISO) and provides a complete visibility platform that supports: DoD customers, DIB Customers, DoD Supply Chain, and other highly regulated industries (Finance, Automotive, Life Science, Utilities, State and Local Government).  Our technology stack includes
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/Cytellix-Governance-Risk-Compliance-GRC?ed=true"&gt;&#xD;
      
           GRC
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://www.cytellix.com/" target="_blank"&gt;&#xD;
      
           ,
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/Cytellix-Endpoint-Detection-Response-EDR?ed=true"&gt;&#xD;
      
           EDR
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://www.cytellix.com/" target="_blank"&gt;&#xD;
      
           ,
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/Cytellix-Managed-Detection-Response-MDR?ed=true"&gt;&#xD;
      
           MDR
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://www.cytellix.com/" target="_blank"&gt;&#xD;
      
           ,
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/Cytellix-Extended-Detection-Response-XDR?ed=true"&gt;&#xD;
      
           XDR
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://www.cytellix.com/" target="_blank"&gt;&#xD;
      
           ,
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/Cytellix-Security-Information-Event-Management-SIEM?ed=true"&gt;&#xD;
      
           SIEM
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.cytellix.com/" target="_blank"&gt;&#xD;
      
           as Service, 24x7 SOC, Vulnerability Management, Real-time continuous cyber monitoring, Firewall Management, and threat hunting and threat correlation.
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5240546.jpeg" length="457570" type="image/jpeg" />
      <pubDate>Mon, 15 Aug 2022 16:33:40 GMT</pubDate>
      <author>bberger@cytellix.com (Brian Berger)</author>
      <guid>http://www.cytellix.com/which-devices-are-most-at-risk-for-cyber-attack</guid>
      <g-custom:tags type="string">Cytellix,News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5240546.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5240546.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>5 Risks Associated With Third-Party Vendors and How Cytellix Can Help</title>
      <link>http://www.cytellix.com/5-risks-associated-with-third-party-vendors-and-how-cytellix-can-help</link>
      <description>When working with third-party vendors, you can run into many different issues with cybersecurity. Many business owners don't realize how much risk is associated with working outside of your company. Cytellix offers top-notch risk management services to help combat the cyber threats that vendors can come with. Let's take a look at some of the most common risks.</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/md/pexels/dms3rep/multi/dice-eyes-luck-game-705171.jpeg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Many businesses work with third-party vendors in one form or another. It doesn't make financial sense to manufacture and store everything you need in-house unless you're a powerhouse enterprise. Even then, you can get high-quality products or services for less if you opt to work with third-party vendors. While there are many benefits to this type of work relationship, several risks can be involved. With the added steps involved in a vendor-business relationship, you create more opportunities for things to fall through the cracks. Risk management is key to avoid costly problems. With
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/Cytellix-Governance-Risk-Compliance-GRC"&gt;&#xD;
      
           risk management services
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            from Cytellix, you can protect your data, finances, productivity, and efficiency. Here are some of the top risks we protect against.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Data Accuracy and Quality
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           One of the risks that come with working with third party vendors is a drop in the accuracy and quality of data. As the old adage says, "if you want something done right, do it yourself." Of course, most businesses physically cannot do everything by themselves, hence why third party vendors are so popular. That being said, you have to give up some control in terms of data. The vendor is responsible for keeping track of their end of the deal, and you just have to trust them to hand over accurate data. If you want certain reports, you may or may not be able to get them depending on the data collection of the vendor company. If you are fortunate enough to gain access to the data you request, you cannot check the validity. You must trust that the vendor uses accurate processes to collect information and that they are sharing the true values with your business. Let's say you make metal widgets and rely on a third party vendor for the machining or final assembly. That vendor could say that all the parts check out and are good to go, but you really cannot validate their statement. Hopefully, your contracts allow private inspectors or auditors to confirm for you; otherwise, you could run into serious trouble. If you install these widgets into aircraft that you are manufacturing and something goes wrong, it's your contracts on the line, not the third-party vendor's. By giving up control of the data checks and quality validation, you risk someone else's mistake negatively impacting your business.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Actionability of Data
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The second risk you face when working with third-party vendors is the actionability of any and all data you receive from them. Actionable data is information that can be acted upon or that gives insight into future, proactive actions. As a business owner, you know the types of data that you want to collect that will be actionable. You likely have processes in place specifically to collect, organize, and analyze this actionable data so that you can keep improving your company. When you rely on data from a third-party vendor, it may not always be actionable in a variety of ways. Firstly, as we previously discussed, unless contractually obligated, the vendor may not be required to collect any data that you require. They may have a different set of KPIs to look at, and they focus solely on those. Without the data you need, you may be limited in insights to make future plans. In terms of more immediate actions, you have even less control. A vendor is a completely separate entity that has autonomy over itself. You may notice a problem in the data, but you have no way of putting solutions in place; that's up to the vendor, and you need both contractually enabled changes or have a very flexible vendor. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Lack Of Continuous Monitoring
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Cytellix understands how important it is to monitor all aspects of your business continuously. When you have "eyes" on all aspects all the time, you significantly reduce the risk of things falling through the cracks. The
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/Cytellix-Cyber-Watch-Portal-CCWP"&gt;&#xD;
      
           Cytellix Cyber Watch Portal
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            was created to give clients a 360-degree view of their business’s inner workings. However, because a vendor is a separate company, continuous monitoring does not apply to them. You can continuously monitor your relationship with the vendor and any transactions taking place, but you cannot see inside their business to know anything about risk management, cybersecurity, and other things that ensure safety. Continuous monitoring is key for spotting problems before they cause chaos. We always suggest finding vendors that deploy their own measurable cybersecurity practices and continuous monitoring as you do so that you don't need to worry about the vendor electronically transferring new risk to your business. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           A Slower Risk Assessment Process
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We all know that processes take longer whenever there are more steps or people involved. Businesses almost always require numerous "stops" as something travels through management. Risk assessment is the same way; the more departments you have to check, the longer it takes. A vendor would add another layer to risk assessments, slowing them down and giving cybercriminals more options to attack before risks are identified and removed. Risk management is necessary to protect data and make good business decisions, and the more vendors you work with, the longer you'll have to wait for each analysis to be finished. Time is money, especially when data and sensitive information are at stake!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           More Opportunities For Security Breaches 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Finally, working with third party vendors can create serious risks to cybersecurity. Yes, you and the vendor work together, but you each have your own cybersecurity plan. You could have top-tier protection with all the bells and whistles, only to be breached because a cybercriminal found a way in via the vendor. A team is only as strong as the weakest link, so if the vendor is lacking in the cybersecurity field, they put you at risk by association. Hackers can break into the vendor and then find their way into your business through them. All of the safeguards you have in place will be useless if a hacker gets in from the back end. A risk management process is essential if you want to find vendors that are as security-conscious as you. We encourage you to take a look into the following cases of vendor-related security breaches from the past few years:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Equifax, 2017
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            - roughly 147 million users' information was leaked, including names, social security numbers, contact information, and even bank account numbers.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Target, 2013- around 41 million payment accounts were leaked as well as personal information for roughly 70 million customers. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            General Electric, 2020 - bank account numbers, passport numbers, contact information, and other sensitive data of employees past and present were leaked. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Instagram, 2020- thousands of Instagram accounts were compromised when passwords were leaked.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As you can see, this is an ongoing problem in the business realm that can be detrimental to companies and consumers alike. It's critical to ensure that vendors meet your standards and expectations regarding cybersecurity measures, or your business could be the next big scandal!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
            Cytellix has been leading the charge in the cybersecurity realm for years. We've worked with hundreds of companies to help them build their security systems, manage risks, and keep their information safe. We offer the patented Cytellix Cyber Watch Portal to offer risk management and real-time continuous monitoring 24/7. This turnkey solution is unlike any on the market and identifies risks and problems, and offers implementation of solutions on your behalf. Our state-of-the-art security measures will safeguard your company as effectively as possible while monitoring all connections for bad actors, data leakages, and user behavior changes. Even government agencies trust us to protect their most sensitive data from prying eyes. Get in contact with us
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="mailto:info@cytellix.com" target="_blank"&gt;&#xD;
      
           here
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            today!
            &#xD;
        &lt;span&gt;&#xD;
          
             ﻿
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/CYT+B+2+Alpha.gif" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.cytellix.com/" target="_blank"&gt;&#xD;
      
           Cytellix
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.cytellix.com/" target="_blank"&gt;&#xD;
      
           has expert capabilities in cybersecurity technology, risk management frameworks (RMF, NIST, CMMC, GDPR, FFIEC, ISO) and provides a complete visibility platform that supports: DoD customers, DIB Customers, DoD Supply Chain, and other highly regulated industries (Finance, Automotive, Life Science, Utilities, State and Local Government).  Our technology stack includes
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/Cytellix-Governance-Risk-Compliance-GRC?ed=true"&gt;&#xD;
      
           GRC
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://www.cytellix.com/" target="_blank"&gt;&#xD;
      
           ,
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/Cytellix-Endpoint-Detection-Response-EDR?ed=true"&gt;&#xD;
      
           EDR
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://www.cytellix.com/" target="_blank"&gt;&#xD;
      
           ,
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/Cytellix-Managed-Detection-Response-MDR?ed=true"&gt;&#xD;
      
           MDR
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://www.cytellix.com/" target="_blank"&gt;&#xD;
      
           ,
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/Cytellix-Extended-Detection-Response-XDR?ed=true"&gt;&#xD;
      
           XDR
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;a href="https://www.cytellix.com/" target="_blank"&gt;&#xD;
      
           ,
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/Cytellix-Security-Information-Event-Management-SIEM?ed=true"&gt;&#xD;
      
           SIEM
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.cytellix.com/" target="_blank"&gt;&#xD;
      
           as Service, 24x7 SOC, Vulnerability Management, Real-time continuous cyber monitoring, Firewall Management, and threat hunting and threat correlation.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/dice-eyes-luck-game-705171.jpeg" length="73915" type="image/jpeg" />
      <pubDate>Fri, 15 Jul 2022 16:48:15 GMT</pubDate>
      <author>bberger@cytellix.com (Brian Berger)</author>
      <guid>http://www.cytellix.com/5-risks-associated-with-third-party-vendors-and-how-cytellix-can-help</guid>
      <g-custom:tags type="string">Cytellix,News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/dice-eyes-luck-game-705171.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/dice-eyes-luck-game-705171.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>The Top Industries at Risk For Cyber Attacks in 2022</title>
      <link>http://www.cytellix.com/the-top-industries-at-risk-for-cyber-attacks-in-2022</link>
      <description>Here are the top industries at risk for cyber-attacks and who are most in need of a robust cyber
security plan:</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/md/dmip/dms3rep/multi/abstract-structure.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As the world becomes increasingly digitized, more and more industries are at risk for
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           cyber-attacks and cyber risk in 2022 than ever before. While no industry is immune to
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           cybercrime, certain industries are particularly vulnerable due to the sensitive nature of their
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           data.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Here are the top industries at risk for cyber-attacks and who are most in need of a robust cyber
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           security plan:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Healthcare:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Healthcare organizations are prime targets for cybercriminals due to the sensitive
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           nature of patient data. Hackers can exploit this data for financial gain or cause havoc by
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           disrupting critical medical operations.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Financial Services: Financial institutions are also attractive targets for cybercriminals due to the
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           large amounts of money involved. Hackers can use stolen financial data to commit fraud or
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           blackmail organizations for financial gain.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Retail:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Retailers are often targeted by cybercriminals due to the large amounts of customer data
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           they collect and store. Hackers can exploit this data for identity theft or fraud or disrupt
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           operations by shutting down online stores through DDoS attacks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Technology:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Technology companies are increasingly targeted by cybercriminals due to their
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           valuable data. Hackers can exploit this data for financial gain or cause havoc by disrupting
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           critical operations or stealing intellectual property.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Telecommunications:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Telecommunications companies are also attractive targets for
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           cybercriminals due to the large amounts of customer data they collect and manage. Hackers can
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           exploit this data for identity theft or fraud or disrupt operations by shutting down phone and
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           internet service.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Education:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Education institutions are often targeted by cybercriminals due to the sensitive
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           nature of student data. Hackers can exploit this data for financial gain or cause havoc by
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           disrupting critical administrative operations.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Government:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Government organizations are attractive targets for cybercriminals due to the
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           sensitive nature of government data. Hackers can exploit this data for financial gain or cause
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           havoc by downloading and distributing sensitive or confidential information.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How Can Companies Protect Themselves from Cyber Attacks?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As the world becomes increasingly digital, the threat of cybercrime grows. Companies must
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           constantly adapt to protect themselves from cyber threats with cyber preparedness 2022.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           There are many ways companies can protect themselves from cybercrime. One way is to
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           educate employees about cyber security. Employees should be taught how to spot phishing
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           emails and other signs of a cyber-attack. They should also know how to keep their passwords
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           safe and secure.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Another way companies can protect themselves is by investing in cyber security software. This
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           software can help to detect and prevent cyber-attacks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Companies like Cytellix are disrupting the industry by bringing together the full spectrum of
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           cybersecurity, compliance, and risk management solutions under one umbrella. Our new
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           software approach to cybersecurity involves a patented SaaS platform designed to correlate
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           compliance data, IT, cloud, and IoT assets into 24/7 advanced threat detection.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cytellix combines the power of in-house, advanced AI capabilities and data from a third-party
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           security product into highly automated services that can be tailored to the needs of SMBs. We
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           can deliver it as a turnkey solution integrated with enterprise-owned assets and more, offering a
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           robust cyber security solution to large and small businesses.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a href="/home986b3b40"&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/CYT+B+2+Alpha.gif" alt=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Finally, companies should have a plan in place for what to do in the event of a cyber-attack. This
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           plan should include steps for how to contain the attack and how to recover from it.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           By taking these proactive steps, companies can help protect themselves from the growing
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           threat of cybercrime and defend against the loss of sensitive internal and external data. Learn
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            more by contacting our talented team at 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/home986b3b40"&gt;&#xD;
      
           Cytellix
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
             here.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/dmip/dms3rep/multi/abstract-structure.jpg" length="212584" type="image/jpeg" />
      <pubDate>Sat, 07 May 2022 00:51:47 GMT</pubDate>
      <guid>http://www.cytellix.com/the-top-industries-at-risk-for-cyber-attacks-in-2022</guid>
      <g-custom:tags type="string">News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/dmip/dms3rep/multi/abstract-structure.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/dmip/dms3rep/multi/abstract-structure.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Venture Debt Financer River SaaS Capital Welcomes Cytellix Corporation to its Growing Portfolio</title>
      <link>http://www.cytellix.com/venture-debt-financer-river-saas-capital-welcomes-cytellix-corporation-to-its-growing-portfolio</link>
      <description>The post Venture Debt Financer River SaaS Capital Welcomes Cytellix Corporation to its Growing Portfolio appeared first on Cytellix.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Ohio investor provides uniquely positioned cybersecurity software firm with crucial capital to drive growth
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           New ParaVenture debt financer 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.riversaascapital.com/" target="_blank"&gt;&#xD;
      
           River SaaS Capital
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            has added software company 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://cytellix.com/" target="_blank"&gt;&#xD;
      
           Cytellix
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            Corporation (Cytellix) to its 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.riversaascapital.com/river-saas-capital-expands-portfolio-of-growing-saas-companies-during-the-covid-19-pandemic/" target="_blank"&gt;&#xD;
      
           expanding portfolio
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            of high-growth companies, providing crucial capital to help the Arizona firm scale its patented cybersecurity SaaS platform. River SaaS Capital has agreed to provide up to $5 million in financing based upon the terms of the deal.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Launched in 2017 as the cyber division of Information Management Resources, Inc. (IMRI), Cytellix Corporation year-on-year growth enabled a spin-out in 2021 and recently completed a major rebranding effort, highlighting their innovative SaaS platform that brings cybersecurity, compliance and risk management under one patented platform.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           “We are very excited to welcome Cytellix to our portfolio,” said River SaaS Capital Chief Investment Officer Wendy Jarchow. “There are very few companies capable of combining such strong SaaS expertise with decades of proven cybersecurity experience.”
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           “As we searched for a partner to provide growth capital, we were immediately attracted to River SaaS Capital because of their knowledge in our space,” added Cytellix President and CEO Brian Berger. “They understand how SaaS businesses like ours operate and how to provide the kind of flexible support we need to scale rapidly.”
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cytellix’s patented SaaS platform correlates cyber compliance data, IT, cloud and IOT assets into a 24/7 advanced threat detection and response platform. Combined with in-house AI solutions and data from third-party security products, the platform can be customized to fit the needs of virtually any user, from small business owners to massive enterprise clients.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This unique solution immediately attracted the attention of River SaaS Capital, whose team has developed a strong understanding of the cybersecurity industry landscape.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           “We always try to offer value to our portfolio companies beyond simply writing a check,” said Jarchow. “In this case, we have access to strong cybersecurity experts who can help provide strategic guidance and reach.”
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           “It's rare to find an investor that specializes in supporting SaaS Companies and even more rare to find one who also has strong knowledge of our specific industry,” added Berger. “We have a great partner in River SaaS Capital, and we look forward to working together to take Cytellix to the next level.”
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ***
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           About River SaaS Capital
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           River SaaS Capital provides alternative venture financing to growing software-as-a-service (SaaS) businesses in the U.S. River SaaS offers fast, flexible financing solutions, typically providing non-dilutive, revenue-based financing to qualified new borrowers in 36-48 month term loans and growing with its portfolio companies over time (via either debt and/or equity). For more information, check out our 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.riversaascapital.com/funding-solutions/" target="_blank"&gt;&#xD;
      
           funding solutions
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            and follow 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://c212.net/c/link/?t=0&amp;amp;l=en&amp;amp;o=3425541-1&amp;amp;h=634916470&amp;amp;u=https%3A%2F%2Fc212.net%2Fc%2Flink%2F%3Ft%3D0%26l%3Den%26o%3D2583585-1%26h%3D1659255225%26u%3Dhttps%253A%252F%252Ftwitter.com%252Friversaascap%26a%3D%2540riversaascap&amp;amp;a=%40riversaascap" target="_blank"&gt;&#xD;
      
           @riversaascap
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            on Twitter.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           About Cytellix Corporation
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We believe cybersecurity is more than just using technology to solve problems. That is why we have created a first-of-its kind SaaS platform that brings together the full spectrum of cybersecurity, compliance, and risk management solutions under one umbrella.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Our mission is to protect businesses small and large from threats unseen. Not just today, but for the future. With a plan of action that minimizes time and cost disruption and patented technology that evolves as quickly as the threat evolves, preventing attacks before they occur.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We provide a highly-optimized, continually adjusting security framework that supports organizations through their entire life cycle. And we invent technology that solves not just security and compliance problems, but business problems. In real time. At all times.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           For more information, please visit 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.cytellix.com/" target="_blank"&gt;&#xD;
      
           https://www.cytellix.com
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            or email: pr@cytellix.com
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a href="/home986b3b40"&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/CYT+B+2+Alpha.gif" alt=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/AdobeStock_267959978.jpeg" length="144854" type="image/jpeg" />
      <pubDate>Wed, 20 Apr 2022 17:32:00 GMT</pubDate>
      <guid>http://www.cytellix.com/venture-debt-financer-river-saas-capital-welcomes-cytellix-corporation-to-its-growing-portfolio</guid>
      <g-custom:tags type="string">News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/AdobeStock_267959978.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>With Increased "Work From Home" Employees, How Can Companies Improve Cybersecurity?</title>
      <link>http://www.cytellix.com/with-increasing-occurrences-of-virtual-employees-how-can-companies-improve-cybersecurity</link>
      <description>2020 led to many changes when it comes to work environments. Due to the global pandemic, many office settings were forced to close, and employees had to adapt to working from home. With such a sharp increase in virtual employees, cybercriminals saw more opportunities to cause chaos. How can companies improve cybersecurity for out-of-office employees? Let's take a look.</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/unnamed+%285%29.png" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The COVID-19 pandemic made work environments change in almost an instant. Offices were forced to close down to keep employees safe and socially distanced. For many companies, a large number of employees are still working from home, at least part-time. Some businesses even chose to become permanently remote to save on overhead costs. While working from home is more convenient for employees, it can spell trouble for maintaining proper cybersecurity hygiene as a whole. Think about it; each employee is working from their own networks, in different areas of the state, country, or world, and networks and user behavior cannot be as meticulously analyzed as it could when all processes were happening under one roof. Cybersecurity is more important than ever to avoid data leaks, system breaches, and other cybercrimes. Here are a few ways you can improve your cybersecurity for employees working from home. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Insist that all work be done from company devices that are equipped with a VPN
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The most important tip that we can give you when it comes to protecting your company's information is to ensure that all remote employees are working only from company-provided devices. There is no reason to overlap personal and work tasks on phones, tablets, or laptops. That being said, it is your responsibility to provide these devices and enforce that they are to be used only for work. Make sure you are an administrator on all devices so you have access to settings that you don't want to be changed. In addition, you want to install a VPN (Virtual Private Network) on all computers or laptops. A VPN provides a secure and dedicated communication path for the laptop to work under, preventing hackers from accessing sensitive information or tracking the device. Make sure to invest in a solid VPN provider that is secure and well-trusted. Cybercriminals are crafty, so you want a VPN service that can stand the test of time. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Encrypt all devices to protect data
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Before you give each remote employee a device equipped with a VPN, you should encrypt all data on it. Encryption translates plain text data into code that only those with authorization can translate back. Sensitive data should be encrypted from everyone except the highest-level employees, but other information can be visible to the entire company. Encryption takes standard data and morphs it into ciphertext that can only be decrypted with a permission key. This allows sensitive information to be transferred via the internet with a reduced risk of clear text view from cybercriminals. There are several types of encryption to choose from, so pick the one that will protect the data of your business. Encryption is particularly important for businesses that store client information such as hospitals, banks, government agencies, and more. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Require multi-factor verification/login
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Another way companies are protecting data is by requiring multi-factor verification. Let's say a remote employee wants to access the database of customer records from home. Firstly, that should be encrypted. If that employee has permission to decrypt data, you should still require at least two other sign-in methods. You can have your multi-verification set up to lock after so many failed attempts. Not only will this deter hackers, but it will also alert the leaders of the company when a cyberattack is attempted. With the technology available to us, we can create all kinds of verification processes that require several passcodes/pins, SMS verification, email confirmation, and more. The more walls you put between the outside world and your important data, the safer working from home will become. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Be selective with which employees can access sensitive data
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you're like most companies, you have a hierarchy of employees. When you work in-person, there are some tasks and meetings that can only be done by high-level workers. You should keep this same mentality when you make the transition to remote working. Give your senior employees access to the more sensitive information while barring other team members from it. Basically, if a worker doesn't need the information to complete their daily tasks, they shouldn't be privy to it. Provide access only to data that is relevant to each department to prevent potential problems. The more people that can get into secret files, the more points of entry cyber criminals can try to get through. Keep the hand close to your chest as they say.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Install anti-virus software or custom cybersecurity solutions on all devices 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Finally, you need to ensure that any and all company devices have a solid antivirus program installed. Better yet, get a customized cybersecurity solution that provides complete cyber awareness. Cytellix has worked with hundreds of companies, including some top government agencies that require the utmost digital protection. Our team can create cybersecurity solutions that meet your exact needs and allows the business leaders to keep an eye on all goings-on, even when employees work from home. Our Cytellix Cyber Watch Portal gives you a 360-degree look at the entirety of your business. You can spot weaknesses in your security, identify problems before they arise, and instantly implement solutions. No other cybersecurity specialist offers an all-in-one platform as we do. With all of your employees working from home, it's more important now than ever to continuously monitor your network, systems, processes, and data. When you work with Cytellix cybersecurity experts, you get top-of-the-line software that is leaps and bounds above other affordable solutions. When you work with the best, you get the best. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
            As you can see, there are many steps you can take to protect your business and clients as your team works from home. For the highest-level protection, work with cybersecurity experts like Cytellix to get customized solutions designed and implemented just for you. Cytellix has expert capabilities in cybersecurity technology, risk management frameworks (RMF, NIST, CMMC, GDPR, FFIEC, ISO) and provides a complete visibility platform that supports: DoD customers, DIB Customers, DoD Supply Chain, and other highly regulated industries (Finance, Automotive, Utilities, State and Local Government).  Our technology stack includes SIEM as Service, 24x7 SOC, Vulnerability Management, Real-time continuous cyber monitoring, Firewall Management, and threat hunting and threat correlation. Call (949) 215-8889 to speak with our team today and learn more at
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://cytellix.com/" target="_blank"&gt;&#xD;
      
           https://cytellix.com/
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            .
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a href="/home986b3b40"&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/CYT+B+2+Alpha.gif" alt=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
          The post
          &#xD;
    &lt;a href="/with-increasing-occurrences-of-virtual-employees-how-can-companies-improve-cybersecurity/"&gt;&#xD;
      
           With Increasing Occurrences of Virtual Employees, How Can Companies Improve Cybersecurity?
          &#xD;
    &lt;/a&gt;&#xD;
    
          appeared first on
          &#xD;
    &lt;a href="https://cytellix.com"&gt;&#xD;
      
           Cytellix
          &#xD;
    &lt;/a&gt;&#xD;
    
          .
         &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-935743.jpeg" length="181647" type="image/jpeg" />
      <pubDate>Sat, 08 Jan 2022 15:00:00 GMT</pubDate>
      <guid>http://www.cytellix.com/with-increasing-occurrences-of-virtual-employees-how-can-companies-improve-cybersecurity</guid>
      <g-custom:tags type="string">Cytellix</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-935743.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-935743.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>CMMC 2.0: Here’s Everything You Need To Know</title>
      <link>http://www.cytellix.com/cmmc-2-0-everything-you-need-to-know</link>
      <description>The DoD announced a change to CMMC 1.0 and renaming as CMMC 2.0.  Within this change are a host of enhancement and implications for the supply base at a high level.  I will outline the changes as directly as possible.  The main change is the addition of self-assessment similarly to NIST 800-171 under DFAR 252.204-7012.  In addition to the self-assessment is the requirement for annual affirmation by the company leadership.  This is where the rubber really hits the road.  Affirmation under the False Claims Act, where both prosecution and insider complaints will be addressed.  I suggest all suppliers read this link.  In addition to these, changes in 2.0 will be lower costs for suppliers as certification by a 3rd party is no longer required in many cases.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/p&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Newly released CMMC 2.0 Makes Changes and Creates More Uncertainty of What to Do Next?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/p&gt;&#xD;
    &lt;h5&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/h5&gt;&#xD;
    &lt;h1&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Before we start with the background and changes, let’s talk about the "Big Elephant” in the room.  Clearly, the compliance and certification process developed by the DoD and the non-profit organization liaisons has been mishandled.  I am being polite here, and not intending to insult anyone directly however, this does highlight the movie comedy and colloquial meaning of
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;a href="https://www.loc.gov/static/programs/national-film-preservation-board/documents/groundhog_day.pdf" target="_blank"&gt;&#xD;
        
            Groundhog Day
           &#xD;
      &lt;/a&gt;&#xD;
      &lt;span&gt;&#xD;
        
            .  Since the
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;a href="https://loc.gov/" target="_blank"&gt;&#xD;
        
            Library of Congress
           &#xD;
      &lt;/a&gt;&#xD;
      &lt;span&gt;&#xD;
        
            selected the film for preservation in the National Film Registry, I found the humor not cynicism.  We have seen the start and restart of the cyber programs for DoD for the past 5-years, what makes this different? 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/h1&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/p&gt;&#xD;
    &lt;h1&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Opinion: This is different and the information we have in the DoD supply chain must be protected from our adversaries.  This is a serious issue and needs clear and precise guidelines as the supply chain will not spend money on protection of the information that protects national security, unless they must.  That’s an unfortunate reality.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/h1&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The DoD announced a change to CMMC 1.0 and renaming as CMMC 2.0.  Within this change are a host of enhancement and implications for the supply base at a high level.  I will outline the changes as directly as possible.  The main change is the addition of self-assessment similarly to NIST 800-171 under DFAR 252.204-7012.  In addition to the self-assessment is the requirement for annual affirmation by the company leadership.  This is where the rubber really hits the road.  Affirmation under the
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;a href="https://www.justice.gov/civil/false-claims-act" target="_blank"&gt;&#xD;
        
            False Claims Act
           &#xD;
      &lt;/a&gt;&#xD;
      &lt;span&gt;&#xD;
        
            , where both prosecution and insider complaints will be addressed.  I suggest all suppliers read this link.  In addition to these, changes in 2.0 will be lower costs for suppliers as certification by a 3rd party is no longer required in many cases.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/p&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/p&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;span&gt;&#xD;
        
            There is now the ability to present interim status vs 100% compliance as we have with the current DFARS and NIST requirements.  These interim reports can be handled in the traditional manner by presenting a Plan of Action and Milestones (POAM) that have a less than 180-day completion date for allowed baseline gaps.  Unallowed gaps will have a “No POAM” designation and need to be implemented.  If you have any doubts, work with a highly skilled 3rd party who has expertise in these standards and track record of enabling comprehensive successful standards-based cyber programs.  The information presented by the suppliers in POAM’s or claiming 100% compliance will be evaluated and can and will likely trigger audits if certain high level cyber controls are not met or the 100% compliance score creates suspicion of a false claim. Be careful to present accurate and validated information.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/CMMC+2.0+%282%29.png" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           There will be a rulemaking process that is expected to take place for 9+ months and the CMMC 2.0 will not show up in acquisitions until the rulemaking process is complete. There is an expectation that once the rulemaking is complete, the effects of and implementation will likely be swift and mandatory.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            So, what does this all mean?  Reality, if you are a DoD supplier or have plans to be one. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           YOU MUST be compliant with the DFARS clause 252.204.7012 and NIST 800-171 under your current contracts. (
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://cytellix.com/nist-sp-800-171-cmmc-interim-rule-effective-november-30-2020/" target="_blank"&gt;&#xD;
      
           NIST SP 800-171 &amp;amp; CMMC Interim Rule Effective November 30, 2020 - Cytellix
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ).The False Claims Act applies today to all cyber compliance representations.  You should start now preparing for CMMC 2.0 as it clearly aligns with DFARS and NIST. Waiting is a bad idea.  Why you ask?  It is very clear that most suppliers and Small and Medium Businesses are not cyber prepared and nowhere near compliance with any cyber framework.  The timeframe for a typical business to understand, develop and implement full compliance is more than 1-year assuming they have skills and personnel to complete the objectives. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           *If you have any questions, please reach out to our experts – info@cytellix.com
           &#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a href="/home986b3b40"&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/CYT+B+2+Alpha.gif" alt=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/helicopter-army-military-war-87011.jpeg" length="649474" type="image/jpeg" />
      <pubDate>Fri, 19 Nov 2021 21:15:00 GMT</pubDate>
      <guid>http://www.cytellix.com/cmmc-2-0-everything-you-need-to-know</guid>
      <g-custom:tags type="string">Cytellix,News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/helicopter-army-military-war-87011.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/helicopter-army-military-war-87011.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Hackers Are Getting More Advanced: Stay One Step Ahead</title>
      <link>http://www.cytellix.com/hackers-are-getting-more-advanced-stay-one-step-ahead</link>
      <description>As technology advances, so too do the methods hackers and other cybercriminals will use to obtain valuable data from businesses. As business owners, it is our responsibility to stay several steps ahead of these hackers to protect our internal data as well as all client/customer information we have. How can we do this? Let's take a look.</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/unnamed+%286%29.png" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Individuals and enterprises alike are well aware that technology is almost constantly changing and advancing. We are able to do things today that past generations would have never thought possible! While technology is hugely beneficial to companies, its volatile nature is proving to be problematic at times as well. Businesses need to stay on their toes to adapt to changing software and solutions as quickly as possible. Cybercriminals are busy finding ways to make this more advanced technology a tool for their own use. If you don't stay at least one step ahead, hackers can wreak havoc in your databases. Here are a few tips to stay protected!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Know What You're Fighting Against
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The first thing you have to do before you can combat a problem is identifying the problem. You need to know what it is, where it exists, and how serious it is. Cybercriminals are extremely tech-savvy and are well-versed in even the most elite software. Today's online criminals use sophisticated software, bots, viruses, Trojans, and phishing techniques. Unlike hackers of the past, these new-age criminals can automate the entire process; they can be infiltrating your system while they sleep! Passwords are no match for hackers, so you'll need to amp up your cybersecurity game if you want to stand a fighting chance. Once these cybercriminals get in, they don't always
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           steal
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            data these days. Some new attacks now do data manipulation which is far harder to spot than a full-fledged data leak. By changing some numbers here and some addresses there, you could be looking at millions of dollars lost and just as many angry customers. The crimes are getting stealthier, so you need to be more alert than ever.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Continuous Monitoring Is Key
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           One of the most fool-proof ways of avoiding serious cyberattacks is installing a cybersecurity continuous monitoring system. Your business undoubtedly has many moving parts. If you rely on your employees to keep track of everything, something will eventually fall through the cracks. If you put monitoring in the hands of cybersecurity software leveraging, AI, or other cybersecurity solutions, the odds of missing something important drop exponentially. The Cytellix Cyber Watch Portal (CCWP) puts all the power in your hands. You get a 360-degree view of the inner workings of your company from one convenient platform. With the CCWP, you have constant access to everything that's happening in the company. We can customize the platform to track exactly what you need to stay on top of the game. Our revolutionary technology can even implement solutions on your behalf! When you have a cybersecurity continuous monitoring system, you will be alerted of any abnormal happenings in your systems, networks, and clouds. We understand that cybersecurity requires proactive measures rather than reactive, so our Cyber Watch Portal will let you know if it finds any weakness so that they can be corrected ASAP. We'll be watching 24/7, and hackers won't stand a chance!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Work With A Team Of Experts
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Depending on your company’s size, you may find overseeing cybersecurity daunting; problem solved with our easy-to-use Cyber Watch Portal. If cyber seems like an overwhelming concern, or if you simply want to ensure maximum protection against cyberattacks, we highly suggest partnering with a team of experts. Cytellix has been protecting companies big and small for decades. Our technologies grow and change with the cadence of your company and our team adapts accordingly. The Cytellix team can manage your cybersecurity solutions so that you have even less to worry about. We will make updates as necessary based on our findings. We work closely with each client to determine the best course of action when creating a cybersecurity solution package. Our staff is always more than happy to answer questions and provide insight that will improve your understanding of the climate around you. We are just a call away at 1.949.215.8889.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Training Is Essential
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Training is absolutely essential when it comes to protecting yourself against cyberattacks. The entire team needs to be trained on technologies to understand the process. You want all data to be entered in the same way in the same place so that it is secure and easy to find. You must train the team on specific processes, technologies, and policies to ensure that everyone in the company is on the same page. Create a very clear hierarchy of access and outline who can access what, when, why, and how. The more uniformly a task is done, the less likely it is to get messed up. Train employees enough that the procedures become second nature. If you rely on certain nomenclature, drill it into the team repeatedly. If you have a strict policy about changing passwords every x-amount of weeks, be sure to follow through if it's not done. You can also consider training the higher-ups to access and interpret the data from the Cyber Watch Portal so that all responsibility is not sitting solely on your shoulders. Our portal is extremely user-friendly and was designed specifically to make your life easier. With the right training, anyone from your team can take the helm and keep watch for problems or security breaks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            It is possible to close the gap between the known and unknown cybersecurity gaps in organizations of any size. We can create custom solutions that bring areas of your company to life that you never looked into before. Our experts will help you identify areas of weakness and will work with you to implement effective and long-lasting solutions. No matter what size your company is, we can help you improve your cybersecurity to protect against hacks. Give us a call at 1.949.215.8889 to speak to our team, or visit
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://cytellix.com/" target="_blank"&gt;&#xD;
      
           https://cytellix.com/
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            to learn more about us. We look forward to hearing from you soon! 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cytellix has expert capabilities in cybersecurity technology, risk management frameworks (RMF, NIST, CMMC, GDPR, FFIEC, ISO) and provides a complete visibility platform that supports: DoD customers, DIB Customers, DoD Supply Chain, and other highly regulated industries (Finance, Automotive, Utilities, State and Local Government).  Our technology stack includes SIEM as Service, 24x7 SOC, Vulnerability Management, Real-time continuous cyber monitoring, Firewall Management, and threat hunting and threat correlation.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a target="_blank" href="/home986b3b40"&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/CYT+B+2+Alpha.gif" alt=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
          The post
          &#xD;
    &lt;a href="/hackers-are-getting-more-advanced-stay-one-step-ahead/"&gt;&#xD;
      
           Hackers Are Getting More Advanced: Stay One Step Ahead
          &#xD;
    &lt;/a&gt;&#xD;
    
          appeared first on
          &#xD;
    &lt;a href="https://cytellix.com"&gt;&#xD;
      
           Cytellix
          &#xD;
    &lt;/a&gt;&#xD;
    
          .
         &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5380673.jpeg" length="124272" type="image/jpeg" />
      <pubDate>Tue, 30 Mar 2021 15:00:00 GMT</pubDate>
      <guid>http://www.cytellix.com/hackers-are-getting-more-advanced-stay-one-step-ahead</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5380673.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5380673.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>The Hidden Aspects of Cybersecurity</title>
      <link>http://www.cytellix.com/the-hidden-aspects-of-cybersecurity</link>
      <description>Cybersecurity is a well-known term these days across businesses in all industries. As more and more companies take to the digital realm, they find themselves in need of help with protecting confidential data. Cybersecurity companies like Cytellix have been finding new ways to keep data safe and secure from all cyber attacks. Many companies don't realize where their weaknesses are until it's too late. Here are some aspects of cybersecurity that are often overlooked.</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/unnamed+%282%29.png" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           It should come as no surprise that businesses are flocking to the cloud and other digital platforms to replace their outdated data management systems. The internet is a wonderful thing, and the capabilities that come with it are unmatched. Unfortunately, many businesses head online without taking the proper precautions. The internet has plenty of hackers, all of whom are looking for weak spots in data collections so they can make their move. Many business owners believe they are prepared against cyber attacks, but few are as secure as they would hope to be. Cybersecurity companies like Cytellix are here to ensure that you have no weak link, no open door, and no unprotected file floating around in the cloud. Let's take a look at some of the weakest areas of cybersecurity we often see. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Payment Processors
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           One of the most sought-after areas to attack are payment processors. We've all heard news stories about credit card information being stolen from retail stores, major banks, and more. Hackers will always aim to find money, so payment processors are particularly at risk of cyber attack. Hackers are adapting as technology advances, so we aren't always as safe as we think. Here at Cytellix, we are constantly looking towards the future to figure out what hackers might try next. By staying several steps ahead, we are able to safeguard any and all payment-related programs from breech. Consumers are able to make payments in many ways, several of which involve digital processes. Credit cards, debit cards, online payment, direct deposits, mobile banking, and more are all viable areas for hackers to target. It's crucial to pay extra attention to these areas to protect both company and consumer finances. When a person or business gets their credit information stolen, it is a process and a half to fix. Not to mention the lawsuits that will inevitably come if it's determined that the business did not have the proper safeguards in place. Cytellix is committed to protecting financial data at all costs, so we go the extra mile when it comes to setting up and managing cybersecurity services for payment processors. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Information Databases
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           When hackers aren't successful at stealing credit and banking data, they'll go for the next best thing; personal information. Identity theft is far more common than it should be. Back in the day, most identity theft cases came from someone losing an ID or being robbed. Now, with most information available somewhere in the cloud, hackers can steal thousands of identities without leaving their homes. It's shocking how frequently we put personal information online. Whenever we create online accounts, you're asked for, at the bare minimum, your name, and email address. Without the proper cybersecurity in place, your customers' valuable personal information is up for grabs. It's more important than ever to protect personal information from cyber-attacks because more and more important duties are heading online. Banking, insurance, taxes, the entirety of your smartphone's data, they're all on the cloud, and therefore all vulnerable for attack. Even though you might be asking for "general" personal information, hackers can get a lot out of it. For example, if someone can connect a name with a birthdate, cybercriminals can likely figure out their social security numbers. People of the same birth year have the same first two sections, and many websites ask for the last four digits as a login. Add them together, and you have easy access to someone's identity!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Email Systems
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           While email addresses can also be included in the "personal information" section, some hackers are out for them specifically. Malicious malware is sent most commonly through emails, the recipients of which could have been found through weak security spaces. In addition, emails can be hunted down by cybercriminals, only to be sold to businesses for unsolicited email lists. This is illegal but happens all the time. If hackers get into business emails, there's a chance they can then get into shared drives on Google or similar platforms. Once they're in there, the havoc they can cause has no limits. They can email clients from your accounts, change passwords, delete or corrupt documents, and more. Cytellix is fully aware that emails are valuable to cybercriminals, so we make it our mission to safeguard them. With our help, you can feel confident that internal emails and customer emails will be kept confidential as intended. Even if they don't cause too much damage, security breaches will destroy any trust that your customers have in you. It's extremely challenging to rebuild that relationship, so the best thing to do is enact cybersecurity services ASAP. Hire a team you can trust to build out and manage your cybersecurity system. With us, all emails will be safe and sound!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Manual Processes
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           One of the easiest things for hackers to break into is anything done manually. Human error is a business's worst nightmare, especially online. It's not wise to trust your employees to follow a rigorous protocol for tasks they often do. Odds are, something will fall through the cracks, opening a window of opportunity for cybercriminals to sneak in. We always suggest automating processes as often as possible because computers don't forget. If you need all documents to be saved in a particular folder, create an automation for it. That way, none of your valuable data can be stolen because an employee accidentally saved a Google Doc to the wrong place. The less human interaction you can make with digital tasks, the better. Of course, most human errors are completely accidental and nothing to get upset about, but an accident can result in a lot of headaches for you in the wrong situation. Cybersecurity companies will be able to look at your current processes and find weak spots vulnerable for attack. Cytellix does a thorough analysis to make sure we don't miss anything. We'll discover weaknesses caused by human error and help implement permanent solutions. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you're ready to start working with one of the most trusted cybersecurity companies in the business, call Cytellix today! Our team of experts has been entrusted to protect some of America’s biggest companies, including the US Army, the Department of Homeland Security, the Department of Defense, and NASA. We will curate solutions specifically for you, making sure to lock up your data, so it's airtight. Call us today at (949) 215-8889 to get started.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cytellix has expert capabilities in cybersecurity technology, risk management frameworks (RMF, NIST, CMMC, GDPR, FFIEC, ISO) and provides a complete visibility platform that supports: DoD customers, DIB Customers, DoD Supply Chain, and other highly regulated industries (Finance, Automotive, Utilities, State and Local Government).  Our technology stack includes SIEM as Service, 24x7 SOC, Vulnerability Management, Real-time continuous cyber monitoring, Firewall Management,  and threat hunting and threat correlation.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/CYT+B+2+Alpha.gif" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
          The post
          &#xD;
    &lt;a href="/the-hidden-aspects-of-cybersecurity/"&gt;&#xD;
      
           The Hidden Aspects of Cybersecurity
          &#xD;
    &lt;/a&gt;&#xD;
    
          appeared first on
          &#xD;
    &lt;a href="https://cytellix.com"&gt;&#xD;
      
           Cytellix
          &#xD;
    &lt;/a&gt;&#xD;
    
          .
         &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-3861976.jpeg" length="588048" type="image/jpeg" />
      <pubDate>Fri, 12 Mar 2021 16:00:00 GMT</pubDate>
      <guid>http://www.cytellix.com/the-hidden-aspects-of-cybersecurity</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-3861976.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-3861976.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>5 Ways Our Cytellix Cybersecurity Watch Portal Is Changing The Industry</title>
      <link>http://www.cytellix.com/5-ways-our-cytellix-cybersecurity-watch-portal-is-changing-the-industry</link>
      <description>Cybersecurity should be a top priority for just about all companies. If you have weak security systems in place (or none at all!), you are at risk of cyber-attack. Internal and customer data can be stolen, and you could ruin your reputation. Cytellix has an innovative solution - the Cytellix Cyber Watch Portal (CCWP) - that lets you monitor all aspects of your cyberspace in one convenient platform. Here's a bit more about it.</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/unnamed+%284%29.png" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           The Cytelli
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           x Cyber Watch Portal (CCWP) is a patent-pending platform from our team of experts. We've seen the shortfalls in the industry, and we've put our hearts into creating a simple solution. The CCWP is our "single pane of glass" that lets you look into every area of your business to manage and implement cybersecurity processes. All cybersecurity companies offer ways to keep track of your data or monitor segments of the network, but only Cytellix provides a 360-degree view from a single platform. What makes our CCWP so unique? Let's take a look!
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            It's Making Cybersecurity More Convenient
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        &lt;br/&gt;&#xD;
        
            The most obvious benefit of the Cytellix Cyber Watch Portal is the convenience it offers. As we're sure you know from experience, dealing with any kind of technology can be stressful and confusing, especially if it's not something you work with on a daily basis. Many cybersecurity companies can set you up with fantastic technology, but you'll have to learn to navigate several software platforms and build expertise. You have enough to worry about with running your business without the added hassle of learning new technology. You'll spend hours mastering the process of monitoring, checking, and implementing solutions. Cytellix understands that time is money, so our CCWP is a single platform for you to learn that has everything you need right there in front of you. You don't need to worry about transferring data from one software to another, or managing multiple dashboards, so you can spend more time reviewing the data rather than shuffling it around.
            &#xD;
        &lt;br/&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Implementation and Monitoring All In One Place
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;br/&gt;&#xD;
          &lt;br/&gt;&#xD;
          
             Cytellix's Cyber Watch Portal is the first to combine Risk Management, Implementation, and Cyber-Monitoring in one place. You can track data and stay aware of any security weaknesses or breaches,
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            and
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             you can do things about them right away. Our portal offers several options for troubleshooting, and it can recommend solutions for you and can implement the solutions on your behalf. You have control of everything in one place, so you can find a problem, see what can be done, and execute the plan without even leaving the page you're on. We don't see the point in making this complex process more difficult, so we created the CCWP with our clients in mind. It's been very well received, and we are continually working to make it even better!
             &#xD;
          &lt;br/&gt;&#xD;
          &lt;br/&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            It Makes Data More Accessible
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        &lt;br/&gt;&#xD;
        
            For some reason, most cybersecurity companies like to make it difficult for customers to get a hold of their data. Some companies even require that you go through them in the form of a request. If you want to check your cybersecurity right now, that type of process would never work. We believe in total transparency, and we're here to make your life easier, not harder. The Cytellix Cyber Watch Portal has every piece of information you could need or want access to. We customize the portal for each client based on your business, cybersecurity services, and protection level. We hope that our innovative approach to cybersecurity monitoring will make its way into the industry more and more. It's unfair to clients to withhold information, and it can be detrimental to their business. By making the platform easy to use and completely comprehensive, any business owner has the power to monitor their security measures. It's our hope that other companies will follow suit and come up with solutions that business owners feel confident using. 
            &#xD;
        &lt;br/&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Continuous Monitoring At Your Fingertips
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        &lt;br/&gt;&#xD;
        
            One of our CCWP’s most complimented aspects is the real-time continuous monitoring that you get with it. You can check for security updates anytime, anywhere. Data is stored in real-time, and you'll get alerted about any security breaches. You can pop into the software to see how things are going. Check as many times as you'd like! Via the patent-pending Cytellix Cyber Watch Portal, you’ll have complete visibility of all vulnerabilities, threats with remediation process built-in, and situational awareness by severity. Our capabilities include expert cyber assessments and enterprise-grade tools that identify if recognized threats or malware IP address spaces can be reached from within your network and if any internal network infrastructure participates in malicious activity, such as operating in a botnet. Get continuous monitoring of cyber threats, network situational awareness, and security weaknesses. 
            &#xD;
        &lt;br/&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            You Can Take Action When A Problem Is Detected
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        &lt;br/&gt;&#xD;
        
            Our systems detect any threat intelligence is made actionable by correlating a comprehensive index of an enterprise’s IP address space against known threats. The cyber intelligence we gather can be integrated with other security tools to maximize effectiveness, resulting in an enhanced security posture. Thanks to our revolutionary technology, threats can be identified, and solutions can be put into action almost immediately! Never before has the process been so efficient. You're at the helm of the all-in-one ship, and you can make decisions right away. This can prevent cyber-attacks or at least lessen the severity of any that somehow get through your protections. Of course, with the cyber continuous monitoring, we offer, most clients catch any issues before hackers do. Still, it’s comforting to know that you can integrate our CWWP with tools that will immediately get to work backing up your protective measures. The less time between discovery and repair, the less data is at risk. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
            Cytellix created the Cyber Watch Portal to put more power in the hands of business owners. We hope that our innovative platform makes managing cybersecurity easier than ever. Our clients have seen great success while working with us, and even the US government is partnered with us! Hopefully, cybersecurity will become more accessible to all, and more cyber firms will create better, faster, and more effective platforms. If you're ready to switch to an all-in-one, turn-key solution, contact the Cytellix team! Call us at (949) 215-8889 to get started today! Learn more about how we can help you at
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.cytellix.com" target="_blank"&gt;&#xD;
      
           www.cytellix.com
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Cytellix has expert capabilities in cybersecurity technology, risk management frameworks (RMF, NIST, CMMC, GDPR, FFIEC, ISO) and provides a complete visibility platform that supports: DoD customers, DIB Customers, DoD Supply Chain, and other highly regulated industries (Finance, Automotive, Utilities, State and Local Government).  Our technology stack includes SIEM as Service, 24x7 SOC, Vulnerability Management, Real-time continuous cyber monitoring, Firewall Management,  and threat hunting and threat correlation.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a href="/home986b3b40"&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/CYT+B+2+Alpha.gif" alt=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
          The post
          &#xD;
    &lt;a href="/5-ways-our-cytellix-cybersecurity-watch-portal-is-changing-the-industry/"&gt;&#xD;
      
           5 Ways Our Cytellix Cybersecurity Watch Portal Is Changing The Industry
          &#xD;
    &lt;/a&gt;&#xD;
    
          appeared first on
          &#xD;
    &lt;a href="https://cytellix.com"&gt;&#xD;
      
           Cytellix
          &#xD;
    &lt;/a&gt;&#xD;
    
          .
         &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/Screenshot+2022-07-27+at+15-41-13+Cytellix+Portal+-+Copy+%282%29.png" length="227475" type="image/png" />
      <pubDate>Thu, 11 Mar 2021 16:00:00 GMT</pubDate>
      <guid>http://www.cytellix.com/5-ways-our-cytellix-cybersecurity-watch-portal-is-changing-the-industry</guid>
      <g-custom:tags type="string">Cytellix,News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/Screenshot+2022-07-27+at+15-41-13+Cytellix+Portal+-+Copy+%282%29.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/Screenshot+2022-07-27+at+15-41-13+Cytellix+Portal+-+Copy+%282%29.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>A Closer Look At CMMC &amp; NIST 800-171 Preparedness</title>
      <link>http://www.cytellix.com/a-closer-look-at-cmmc-nist-800-171-preparedness</link>
      <description>The post A Closer Look At CMMC &amp; NIST 800-171 Preparedness appeared first on Cytellix.</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/unnamed+%283%29.png" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We all know that regulated Federal Government information is safeguarded to prevent cyber-attacks from the adversaries of the United States, but did you know that any and all sensitive data, government-owned or not, must be protected by adhering to a specific set of rules? Controlled Unclassified Information (CUI) is information that is sensitive and relevant to the national security interests of the United States, but not under strict Federal regulation. According to the National Archives and Records Administration, the Executive Agent is responsible for creating and implementing unclassified data standards and overseeing compliance. CUI is considered any potentially sensitive, unclassified data that require controls in place to define its proper safeguarding or dissemination. What is NIST 800-171, and how can you meet the requirements? Let's take a look!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           What is NIST 800-171?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           NIST is the acronym for National Institute of Standards and Technology, and 800-171 is a specific publication. NIST 800-171 governs Controlled Unclassified Information in Non-Federal Information Systems. Essentially, 800-171 is a list of standards that must be met to adequately safeguard and distribute personal or sensitive information that is not officially classified. NIST 800-171 was first created in 2003, shortly after the Federal Information Security Management Act was passed. Following a series of serious cyberattacks, it became clear that cybersecurity needed to be ramped up. NIST regulations have changed slightly since the beginning, particularly for certain government agencies like NASA, the Department of Defense (DoD), and the General Services Administration (GSA). Commercial supply chain organizations are also required to adhere to these new guidelines.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            All contractors awarded contracts to provide products or services that require the use of Controlled Unclassified Information (CUI) is ordered to comply with DFARS 252.204-7012
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Over 100 controls must now be addressed, as well as the cybersecurity posture of the supplier’s network or system across the 14 security domains defined in NIST SP 800-171
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The obligation of proof is now placed on the supplier and their entire supply chain.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Failure to comply will result in a Corrective Action Report (CAR), loss of contract, or potential legal actions.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           NIST 800-171 was designed to get all companies on the same set of guidelines for cybersecurity. Prior to the publication, each company could make its own rules. When everyone operates differently, there is no uniformity, and each company will have weak points that are easy to attack. By regulating the process, the government is now confident that sensitive data is under lock and key. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           What is CMMC?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The Cybersecurity Maturity Model Certification is part two of NIST 800-171. CMMC is a program initiated by the United States Department of Defense (DoD) in order to measure their defense contractors’ capabilities, readiness, and sophistication in the area of cybersecurity.  The guidelines set forward in NIST 800-171 are the baseline for CMMC. Using CMMC, it can easily be determined precisely how prepared a company is. There are five levels in total, with Level 1 being baseline NIST requirements and Level 5 being highly advanced with custom processes and cyber technology that is constantly working. As of September 2020, the Department of Defense (DoD) began requesting information that contains CMMC specifications. It is clear that they have a timeline for getting the CMMC into
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           all
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            contracts by 2026. At the moment, CMMC applies to Department of Defense prime contractors and subcontractors. The ultimate goal is to have it apply to each and every contract that handles any sensitive information.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           How Can Cytellix Help?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           It can be daunting for companies and contractors to figure out how compliant they are to these regulations. Cytellix works with several government agencies, including the Department of Defense (DoD), so our team knows the guidelines like the back of our hands. We offer a collection of services that will check off the necessary boxes. We create and implement cybersecurity solutions that will help you meet the expectations of these relatively-new guidelines. We'll check out your current situation, find your weak spots, and propose solutions to build up your security systems. The more cybersecurity you can implement now, the more prepared you will be as the DoD cracks down on NIST 800-171 now and CMMC in the near future. It's far easier to be prepared early than to play catch up when the new contracts come out. By working with our team, you will have a personalized package that can grow and change as you do. It's expected for more versions of CMMC to be released prior to its complete implementation, and Cytellix will be there to make sure you stay on track. Cytellix is available to provide a detailed security services assessment. Our goal is to ensure you are fully aware of the steps required to remain compliant, cyber prepared for certification, and provide a plan of action that will minimize time or cost disruption. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
            The concept of NIST 800-171 and CMMC can be a bit challenging to grasp. The key takeaway is that the Department of Defense (DoD) is putting regulations in place to strengthen security surrounding sensitive but unclassified data. This will protect contractors, companies, and consumers from cyber-attack, and it will keep information away from hackers inside and outside of the US. Preparing for CMMC can be tricky, but Cytellix is here to help. Learn more about our NIST 800-171/CMMC services at
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://bsyl.ink/NIST800-171" target="_blank"&gt;&#xD;
      
           https://bsyl.ink/NIST800-171
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . If you're ready to increase your cybersecurity and become more compliant with these guidelines, call us at (949) 215-8889. We look forward to hearing from you!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Cytellix has expert capabilities in cybersecurity technology, risk management frameworks (RMF, NIST, CMMC, GDPR, FFIEC, ISO) and provides a complete visibility platform that supports: DoD customers, DIB Customers, DoD Supply Chain, and other highly regulated industries (Finance, Automotive, Utilities, State and Local Government).  Our technology stack includes SIEM as Service, 24x7 SOC, Vulnerability Management, Real-time continuous cyber monitoring, Firewall Management, and threat hunting and threat correlation.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a href="/home986b3b40"&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/CYT+B+2+Alpha.gif" alt=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
          The post
          &#xD;
    &lt;a href="/a-closer-look-at-cmmc-nist-800-171-preparedness/"&gt;&#xD;
      
           A Closer Look At CMMC &amp;amp; NIST 800-171 Preparedness
          &#xD;
    &lt;/a&gt;&#xD;
    
          appeared first on
          &#xD;
    &lt;a href="https://cytellix.com"&gt;&#xD;
      
           Cytellix
          &#xD;
    &lt;/a&gt;&#xD;
    
          .
         &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/NIST+3.jpg" length="15463" type="image/jpeg" />
      <pubDate>Thu, 11 Mar 2021 12:00:00 GMT</pubDate>
      <guid>http://www.cytellix.com/a-closer-look-at-cmmc-nist-800-171-preparedness</guid>
      <g-custom:tags type="string">Cytellix,News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/NIST+3.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/NIST+3.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Solve Problems Before They Arise With Network Situational Awareness</title>
      <link>http://www.cytellix.com/solve-problems-before-they-arise-with-network-situational-awareness</link>
      <description>Businesses rely on the internet to accomplish most tasks these days. At least some part of every company is done in the cloud, online, or digitally in some capacity. Are you keeping a watchful eye on your business' network? Hackers and cybercriminals are always waiting for an opportunity to infiltrate your systems, and weak networks are the perfect way in. Solve problems before they start leveraging Network Situational Awareness.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            As a business in 2022, you can't escape the many uses of the internet and networks. Cloud-based storage, applications, and processing have completely changed the game, making completing tasks easier, faster, and more efficient. You would be hard-pressed to find any successful company that does not use some form of digital solution. While most networks are identified as "secured," do you have all the protection you need against cybercriminals? The best way to avoid problems is to catch them before they start. You can identify weaknesses in your network with Network Situational Awareness and continuous cybersecurity monitoring. Here's what this revolutionary cybersecurity solution can do for you and a few things it will help you watch for.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What is Network Situational Awareness?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Network Situational Awareness is precisely as it sounds; being aware of the state of the network your business operates on. Networks are spaces that allow communication between multiple devices. Data is collected and stored in the network and is only accessible to those devices within it. Companies or any business that deals with a lot of sensitive information turn to private networks to keep this data safe. These networks are secured with passwords, pin codes, firewalls, and more security checks to prevent those outside the company from gaining access. Like all other aspects of digital technology and cybersecurity, even the most secure network can have weak spots that put you at risk for a cyberattack. Network Situational Awareness is a system of continuous cybersecurity monitoring that can keep an eye on the network as a whole to identify and flag problems. By staying aware of your network’s status, you can stay one step ahead of hackers to keep valuable information safe. Network Situational Awareness is very involved because of all the moving parts in a network. With the help of cybersecurity experts like Cytellix, you can easily monitor the goings-on from one place.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Who Needs Network Situational Awareness?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Any business that uses a network would greatly benefit from Network Situational Awareness. Leaders in the company need to be able to look at how the network is performing currently versus how it is expected to perform. You need to look at the past, present, and future state of the system to determine how you're doing security-wise. Many people erroneously believe that they are secured enough that there's no reason for concern. The fact of the matter is that the more the network changes, the more likely something is to fall through the cracks. When you're managing fifty or hundreds to thousands of devices on one network, you need to ensure that every possible security measure is being taken. Basically, the more you rely on your company network to do daily tasks, the more important it is to have Network Situational Awareness. Cybersecurity monitoring software and processes can proactively scan every inch of the network to detect problems that would be missed by traditional networking software. Find weak spots before hackers do and avoid data breaches, external attacks, and more.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How Can Cytellix Help?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Cytellix offers state-of-the-art Network Situational Awareness solutions to businesses across all industries. Our program has several overall goals that will protect you, your company, and your clients' information. These goals include:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Proactively identify and monitor 100% of network connections and devices.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Understand all aspects of the network environment — physical, mobile, virtualized, IoT, and cloud (private, public, and hybrid)
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Expose potential problems, such as unplanned Internet connections, unmanaged devices, and unsecured ports
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Monitor in real-time for instant visibility and immediate response
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Alert by severity for threats, leaks, and nefarious activity
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Cytellix created a continuous cybersecurity monitoring system especially to keep an eye on your network. Running in an always-on mode, Cytellix Continuous Monitoring delivers next-generation network discovery, leak path detection, visualization, and analytics to provide network situational awareness — including awareness of your organization’s presence in private, public, and hybrid clouds. Our cybersecurity continuous monitoring has saved clients from catastrophic cyberattacks, data breaches, and network takeovers. We can create personalized solutions for any size business. We even help multi-location businesses keep data secure in company-wide networks or clouds. When you work with Cytellix, you can feel confident that you will be alerted to any cyber or network weaknesses immediately and receive implementation plans to fix said issue.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            In addition to Cytellix Continuous Monitoring for Network Situational Awareness, we also offer custom, high-tech cybersecurity solutions including Risk Management, SIEM as a service, the patent pending Cytellix Cyber Watch Portal, and more. Our turnkey solutions will keep you several steps ahead of cyber criminals so that you can spend less time worrying about your data and more time using it to better your business. Reach out to our team today to get started down the path to improved cybersecurity. Want to get more information? Contact us
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="mailto:info@cytellix.com" target="_blank"&gt;&#xD;
      
           here
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            today.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a href="/home986b3b40"&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/CYT+B+2+Alpha.gif" alt=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.cytellix.com/" target="_blank"&gt;&#xD;
      
           Cytellix
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            has expert capabilities in cybersecurity technology, risk management frameworks (RMF, NIST, CMMC, GDPR, FFIEC, ISO) and provides a complete visibility platform that supports: DoD customers, DIB Customers, DoD Supply Chain, and other highly regulated industries (Finance, Automotive, Utilities, State and Local Government). Our technology stack includes SIEM as Service, 24x7 SOC, Vulnerability Management, Real-time continuous cyber monitoring, Firewall Management, and threat hunting and threat correlation.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/Situational+Awareness.png" length="39572" type="image/png" />
      <pubDate>Mon, 15 Feb 2021 15:00:00 GMT</pubDate>
      <guid>http://www.cytellix.com/solve-problems-before-they-arise-with-network-situational-awareness</guid>
      <g-custom:tags type="string">Cytellix,News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/Situational+Awareness.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/Situational+Awareness.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cybersecurity in The Manufacturing Industry</title>
      <link>http://www.cytellix.com/cybersecurity-in-the-manufacturing-industry</link>
      <description>As the manufacturing industry becomes more data-driven, it finds itself a more frequent target for cyber-attacks. There are many ways manufacturing businesses are coming under attack, all of which can be prevented with proper cybersecurity. Let's take a look at why cybercrime is running rampant in the field and what can be done about it.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Our whole world is relying more and more heavily on the internet and other digital platforms. While this has certainly made life easier and more convenient, it's also created a whole new area of crime: cybercrime. Specific industries are more at risk than others simply due to the nature of the work. As manufacturing becomes more data-driven and proprietary information is leveraged, it's also becoming a larger target for cybercriminals. For an industry that wasn't prepared for the influx of attacks, manufacturing had to adapt quickly and has become a significant risk to US competitiveness. Luckily, there are plenty of cybersecurity options that can save the day.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Our whole world is relying more and more heavily on the internet and other digital platforms. While this has certainly made life easier and more convenient, it's also created a whole new area of crime: cybercrime. Specific industries are more at risk than others simply due to the nature of the work. As manufacturing becomes more data-driven and proprietary information is leveraged, it's also becoming a larger target for cybercriminals. For an industry that wasn't prepared for the influx of attacks, manufacturing had to adapt quickly and has become a significant risk to US competitiveness. Luckily, there are plenty of cybersecurity options that can save the day.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Why is Manufacturing Under Attack?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As we mentioned, manufacturing is relying more heavily on data than it ever has before. According to the United States Department of Homeland Security, based on the number of reported cyber-attacks, the manufacturing industry is the second most frequently targeted industry in the United States. You may be shocked to hear this, but it does make quite a bit of sense. Since the industry is relatively new to data and digital reliance, they have less cyber professionals thus their processes are weaker. Hackers and cybercriminals will look for any kind of weakness to make their lives easier. Until the industry makes cyber part of their business and technology process, they could be easy targets. It's important to note that smaller manufacturers are more at risk than larger ones. Smaller firms have lower budgets and are typically easier to attack and can be used as a stepping stone to larger companies who they supply. Small manufacturers tend to work with or be affiliated with larger manufacturers, so cybercriminals see an opportunity to steal data from both parties. Smaller companies often feel that they're safe from hackers because they "aren't worth it," when in reality, they're usually the first targets. In any case, the information used by the manufacturing organizations is typically proprietary in nature, and that information in the hands of its competitors or adversaries can impact the future revenues and cause irreparable damage. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Information that is considered confidential comes in many forms. Specially in manufacturing, there are more than 365k companies that support the USA Supply Chain for defense of the nation. The information these companies hold is called Controlled Unclassified Information (CUI). In addition to CUI is the process and Intellectual Property (IP) developed by the Supply Chain. Collectively, this information is the primary target of the attackers. Manufacturers must protect both CUI and IP.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How Can You Protect Your Business?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           So, how can you protect your manufacturing business from cybercrime? The best course of action is to hire a team of experts in cybersecurity (like Cytellix), to come and evaluate your current situation. We will take a look at your weaknesses and identify any existing threats. From there, we can look at what you use for security, protection, policies, procedures, data, cloud storage, the IoT, and more, and build an affordable and appropriate package with all the services specific to your organization. It's best to make changes now because most manufacturing companies are regulated for cybersecurity such as CMMC which will be mandatory for all 365k supply chain manufacturers by 2026. In addition, NIST 800-171 guidelines must be adhered to. If your company is in a state that has implemented data protection requirements such as CCPA in California, or you do business with European Union Citizens under the General Data Protection Regulation (GDPR) or you follow ISO (ISO 27001), then a cybersecurity framework based cyber program should be on your agenda. Cytellix will be able to get you in top shape for CMMC, NIST, GDPR, and ISO preparation for audit and certification when the time comes. It's far easier (and more cost-effective) to prepare now, rather than wait until the mandates have already been made. We offer a unique all-in-one platform that allows clients to understand their cyber weaknesses and monitor cyber-attacks in real-time with everything in one place. You can even integrate our Cytellix Cybersecurity Watch Portal with other tools you may already own to immediately implement solutions! Together, we can keep your manufacturing business safe from cybercriminals. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            If you are in the manufacturing industry, the time is now to prepare for stricter data protection regulations. If you make it known right away that you don't make it easy for hackers to get into your systems, you protect yourself from future attacks. You can also use your superior cybersecurity to gain the trust of customers and increase your revenue. Cytellix has worked with hundreds of manufacturing brands in the past, and we can help you too! Call (949) 215-8889 to speak to our team and get started. Visit
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.cytellix.com/" target="_blank"&gt;&#xD;
      
           www.cytellix.com
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            for more information.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.cytellix.com/contact" target="_blank"&gt;&#xD;
      
           Cytellix
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            has expert capabilities in cybersecurity technology, risk management frameworks (RMF, NIST, CMMC, GDPR, FFIEC, ISO) and provides a complete visibility platform that supports: DoD customers, DIB Customers, DoD Supply Chain, and other highly regulated industries (Finance, Automotive, Utilities, State and Local Government). Our technology stack includes Automated Cyber Assessment, SIEM as Service, 24x7 SOC, Vulnerability Management, Real-time continuous cyber monitoring, Firewall Management, and threat hunting and threat correlation.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Want to learn more? Contact one of our talented team members
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="mailto:sales@cytellix.com"&gt;&#xD;
      
           here
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            today.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As we mentioned, manufacturing is relying more heavily on data than it ever has before. According to the United States Department of Homeland Security, based on the number of reported cyber-attacks, the manufacturing industry is the second most frequently targeted industry in the United States. You may be shocked to hear this, but it does make quite a bit of sense. Since the industry is relatively new to data and digital reliance, they have less cyber professionals thus their processes are weaker. Hackers and cybercriminals will look for any kind of weakness to make their lives easier. Until the industry makes cyber part of their business and technology process, they could be easy targets. It's important to note that smaller manufacturers are more at risk than larger ones. Smaller firms have lower budgets and are typically easier to attack and can be used as a stepping stone to larger companies who they supply. Small manufacturers tend to work with or be affiliated with larger manufacturers, so cybercriminals see an opportunity to steal data from both parties. Smaller companies often feel that they're safe from hackers because they "aren't worth it," when in reality, they're usually the first targets. In any case, the information used by the manufacturing organizations is typically proprietary in nature, and that information in the hands of its competitors or adversaries can impact the future revenues and cause irreparable damage. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Information that is considered confidential comes in many forms. Specially in manufacturing, there are more than 365k companies that support the USA Supply Chain for defense of the nation. The information these companies hold is called Controlled Unclassified Information (CUI). In addition to CUI is the process and Intellectual Property (IP) developed by the Supply Chain. Collectively, this information is the primary target of the attackers. Manufacturers must protect both CUI and IP.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How Can You Protect Your Business?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           So, how can you protect your manufacturing business from cybercrime? The best course of action is to hire a team of experts in cybersecurity (like Cytellix), to come and evaluate your current situation. We will take a look at your weaknesses and identify any existing threats. From there, we can look at what you use for security, protection, policies, procedures, data, cloud storage, the IoT, and more, and build an affordable and appropriate package with all the services specific to your organization. It's best to make changes now because most manufacturing companies are regulated for cybersecurity such as CMMC which will be mandatory for all 365k supply chain manufacturers by 2026. In addition, NIST 800-171 guidelines must be adhered to. If your company is in a state that has implemented data protection requirements such as CCPA in California, or you do business with European Union Citizens under the General Data Protection Regulation (GDPR) or you follow ISO (ISO 27001), then a cybersecurity framework based cyber program should be on your agenda. Cytellix will be able to get you in top shape for CMMC, NIST, GDPR, and ISO preparation for audit and certification when the time comes. It's far easier (and more cost-effective) to prepare now, rather than wait until the mandates have already been made. We offer a unique all-in-one platform that allows clients to understand their cyber weaknesses and monitor cyber-attacks in real-time with everything in one place. You can even integrate our Cytellix Cybersecurity Watch Portal with other tools you may already own to immediately implement solutions! Together, we can keep your manufacturing business safe from cybercriminals. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            If you are in the manufacturing industry, the time is now to prepare for stricter data protection regulations. If you make it known right away that you don't make it easy for hackers to get into your systems, you protect yourself from future attacks. You can also use your superior cybersecurity to gain the trust of customers and increase your revenue. Cytellix has worked with hundreds of manufacturing brands in the past, and we can help you too! Call (949) 215-8889 to speak to our team and get started. Visit
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.cytellix.com/" target="_blank"&gt;&#xD;
      
           www.cytellix.com
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            for more information.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a href="/home986b3b40"&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/CYT+B+2+Alpha.gif" alt=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.cytellix.com/contact" target="_blank"&gt;&#xD;
      
           Cytellix
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            h
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            as expert capabilities in cybersecurity technology, risk management frameworks (RMF, NIST, CMMC, GDPR, FFIEC, ISO) and provides a complete visibilityplatform that supports: DoD customers, DIB Customers, DoD Supply Chain, and other highly regulated industries (Finance, Automotive, Utilities, State and Local Government). Our technology stack includes Automated Cyber Assessment, SIEM as Service, 24x7 SOC, Vulnerability Management, Real-time continuous cyber monitoring, Firewall Management, and threat hunting and threat correlation.
            &#xD;
        &lt;br/&gt;&#xD;
        
             
            &#xD;
        &lt;br/&gt;&#xD;
        
             Want to learn more? Contact one of our talented team members
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="mailto:info@cytellix.com" target="_blank"&gt;&#xD;
      
           here
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            today.
            &#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/AdobeStock_212406247-d424ef77.jpeg" length="2685112" type="image/png" />
      <pubDate>Wed, 20 Jan 2021 16:00:00 GMT</pubDate>
      <guid>http://www.cytellix.com/cybersecurity-in-the-manufacturing-industry</guid>
      <g-custom:tags type="string">Cytellix,News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/AdobeStock_212406247-d424ef77.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/AdobeStock_212406247-d424ef77.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>NIST SP 800-171  &amp; CMMC Interim Rule Effective November 30, 2020</title>
      <link>http://www.cytellix.com/nist-sp-800-171-cmmc-interim-rule-effective-november-30-2020</link>
      <description>The post NIST SP 800-171  &amp; CMMC Interim Rule Effective November 30, 2020 appeared first on Cytellix.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           NIST SP 800-171 &amp;amp; CMMC Interim Rule
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Department of Defense’s Interim Rule Effective November 30, 2020
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-209954.jpeg" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            On September 29, 2020, the Department of Defense (DoD) released an
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://c212.net/c/link/?t=0&amp;amp;l=en&amp;amp;o=2953053-1&amp;amp;h=1193581298&amp;amp;u=https%3A%2F%2Fwww.federalregister.gov%2Fdocuments%2F2020%2F09%2F29%2F2020-21123%2Fdefense-federal-acquisition-regulation-supplement-assessing-contractor-implementation-of&amp;amp;a=interim+rule" target="_blank"&gt;&#xD;
      
           interim rule
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            that requires all suppliers to have a current assessment on record in the Government Data Base
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.sprs.csd.disa.mil/default.htm" target="_blank"&gt;&#xD;
      
           SPRS
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            (Supplier Performance Risk System). This applies to organizations who do not provide commercial off-the-shelf (COTS) items. The rule focuses on DoD’s increased requirements for confirming that contractors are currently in compliance with and have implemented all 110 security controls in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171.  There have been a number of cases of high-profile cyber incidents involving defense programs that requires suppliers in the Defense Industrial Base (DIB) proof of compliance and/or proof of advancing compliance.  CMMC is doing a phased to rollout that is expected to take up to 5-years. Until the complete roll-out, the interim rule is in effect.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           DoD has interpreted “implement” to mean that a contractor must create a System Security Plan that explains whether the contractor is in compliance with each of the 110 security controls and a Plan of Action and Milestones (POA&amp;amp;M) that describes how and when the contractor will attain full compliance for any control that is incomplete. Incomplete controls are any control that there is no proof, evidence or artifact that can verify the control is adequately implemented.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What does this mean to suppliers within the DoD supply chain? The DoD is checking SPRS and any supplier on a new contract must have a current assessment ”fresher than 3-years old” backed by a gap analysis, System Security Plan (SSP) and Plan of Action and Milestones (POA&amp;amp;M) with actionable plans to become in compliant quickly. The DoD will perform Assessments (audits) of the information provided in SPRS for suppliers they consider are handling sensitive information that may be critical to the program.  Flow-downs to subcontractors, for non-COTS suppliers, must be enforced and those suppliers must post in SPRS as well. A contractor may not award a subcontract unless the supplier is in SPRS with a current assessment, and validation of an accompanying POA&amp;amp;M and SSP.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Procedures for Contract Awards:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Contracting officer shall verify the summary level score of a current NIST SP 800-171 Assessment, for each covered contractor information system that is relevant to an offer, contract, task order, or delivery order posted in SPRS. Prior to:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Awarding contracts, task orders or delivery order to an offeror or contractor that is required to implement NIST SP 800-171 in accordance with DFARS clause 252.204.7012: or
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Exercising an option period or extending the period of performance of a contract, task order or delivery order with a contractor that is required to implement NIST SP 800-171 in accordance with DFARS clause 252.204.7012.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How long you do you have? November 30, 2020 or within 30-days of your completed assessment to post in SPRS. After November 30, 2020, option-year exercises of an existing contract, require this as well. The key message prior to CMMC certification is that suppliers must be prepared for an audit and the self-assessment / attestation of compliance will be tested for accuracy. Act sooner than later as preparation and proof of compliance and have actionable remediation steps. This is not a simple paperwork exercise!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Assessment requirements (summary)
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Assessment is a review of SSP associated with the covered contractor information system(s)
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Conducted leveraging the DoD Assessment Methodology
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Preparation for a DoD Assessment
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Review Assessment
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Artifact review to verify documentation and implementation per the SSP
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As with previous communications, falsifying records can result in different outcomes depending on the breach or loss of Controlled Unclassified Information (CUI). These include: Loss of contract, corrective action report, punitive damages to criminal prosecution. Remember compliance with NIST SP 800-171 and the future certification under CMMC, requires having all your documentation, technology, vulnerabilities and cyber-monitoring in place. You must have proof of compliance, manage the CUI access, understand threats, leaks, know when your under attack, be able to define if information has leaked from your company, identify the severity of a breach and be able to notify your prime contractor and the DoD of any breach within the notification period. In direct terms, understand your vulnerabilities, monitor for attacks, have control of all logs and external / internal threats and have an actionable model to stop data leakage from occurring in all areas of your business. Get help, be precise, and work with subject matter experts, real cybersecurity is above the common IT services paygrade.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you have any questions, please reach out to our Team –
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;u&gt;&#xD;
      
           info@cytellix.com
          &#xD;
    &lt;/u&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-209954.jpeg" length="246230" type="image/jpeg" />
      <pubDate>Mon, 30 Nov 2020 18:05:00 GMT</pubDate>
      <guid>http://www.cytellix.com/nist-sp-800-171-cmmc-interim-rule-effective-november-30-2020</guid>
      <g-custom:tags type="string">Cytellix,News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-209954.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-209954.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>COVID-19 Remote Working Leveraging NIST/CMMC Cyber Guidance</title>
      <link>http://www.cytellix.com/covid-19-remote-working-leveraging-nist-cmmc-cyber-guidance</link>
      <description>The post COVID-19 Remote Working Leveraging NIST/CMMC Cyber Guidance appeared first on Cytellix.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           COVID-19 Remote Working Leveraging NIST/CMMC Cyber Guidance
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/covid19.jpg" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           NIST SP800-171 and CMMC best practices enclosed provide guidance to meet compliance requirements for remote working. The talented Cytellix Corporation cyber analysts prepared the following guidance. Please take advantage of this valuable set of insights to support your organizations needs for safe remote working and cyber compliance: "Its just good cyber hygiene"
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Remote Work Cybersecurity Concerns
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Working from home, along with other forms of remote work, can present many challenges for organizations trying to balance security concerns with the ability to operate as effectively as possible. The NIST SP 800-171 and now CMMC standards for cybersecurity define several best practices that help to secure access to systems and data, as well as the practices needed to continue business operations by remote workers.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Practices directly related to NIST SP 800-171/CMMC (the Cybersecurity Maturity Model Certification)
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Secure connections to your environment from the outside
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            If employees require access to systems and/or data that reside at company facilities, maintaining the security of those connections is a top priority. Remote access extends the security control enabled on-premise to remotely connected systems, but different risks need to be mitigated with expanded connectivity.   
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Use VPN/HTTPS to ensure connections and communications are protected SC.3.190 – Protect the authenticity of communications sessions.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Ensure secure authentication methods for remote access connections and enforce strong encryption for transmitting data in remote access sessions
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             AC.3.014 – Employ cryptographic mechanisms to protect the confidentiality of remote access sessions.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Ensure VPN connection are configured to prevent split tunneling
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             SC.3.184 – Prevent remote devices from simultaneously establishing non-remote connections with organizational systems and communicating via some other connection to resources in external networks (i.e., split tunneling).
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Ensure network connections are terminated once communication sessions end
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             SC.3.186 – Terminate network connections associated with communications sessions at the end of the sessions or after a defined period of inactivity.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Enforce security for remote access sessions and monitor remote access activity
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             AC.2.013 - Monitor and control remote access sessions.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Use a limited number of remote access control points (entry points into the environment
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ) AC.3.014 – Route remote access via managed access control points.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Require multi-factor authentication for all remote access
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            IA.3.083 – Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Consider and authorize high-privileged remote access to both systems and data, following the least privilege principle.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           High privileged access carries inherent risks that are amplified when extended over remote access. With unrestricted high-privilege access, a compromise of a system admin account may result in unchecked lateral movement of attacks by external threats in your environment. Limiting the scope of high-privileged access as much as is feasible, for both systems and data, helps to mitigate the risks related to compromise of high-privilege accounts.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Review authorization for access to systems from remote locations
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             AC.3.021 – Authorize remote execution of privileged commands and remote access to security-relevant information.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Review authorization for access to sensitive data from remote locations
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             AC.3.021 – Authorize remote execution of privileged commands and remote access to security-relevant information.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Ensure procedures are in place for the handling of sensitive data (controlled unclassified information, federal contract information, personal identifiable information, and other confidential/proprietary data)
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Measures for secure handling of sensitive data should cover operations and activities both inside and outside controlled facilities and spaces. Certain types of data have more directed requirements for handling (e.g. CUI/FCI), but organizations should determine how other types of sensitive data should be handled—from receiving and processing, to storage, and disposal/destruction.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Establish CUI handling procedures for alternate work sites (including teleworking). Consider behaviors such as where/how data is stored, how physical media with sensitive information is stored and disposed of, and
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            PE.3.136 – Enforce safeguarding measures for CUI at alternate work sites. MP.2.119 – Protect (i.e., physically control and securely store) system media containing CUI, both paper and digital.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Control CUI/sensitive information flows—what systems that information is allowed to move between, and how that data moves.
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             AC.2.016 – Control the flow of CUI in accordance with approved authorizations.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Establish and enforce guidelines for system and device security
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The systems used for remote work, whether company provided or BYOD, should have a level of security enforcement to mitigate risks from unauthorized installations and working in unsecured spaces and networks. Also, with corporate provided systems seeing more general use in remote work scenarios, control over physical media use help reduce risk of malware attacks and data breaches.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Control the use of external systems (including BYOD). Remote workers should use approved methods of collaborating, especially when dealing with sensitive information. Ensure cloud and SaaS based collaboration tools are functional while enforcing security.
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             AC.1.003 – Verify and control/limit connections to and use of external information systems.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Use mobile device management to control/manage laptops and smart phones/tablets.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            AC.3.020 – Control connection of mobile devices.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Ensure inactivity screen-lock is enabled
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            AC.2.010 – Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Ensure use of portable storage devices is controlled
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             AC.2.006 – Limit use of portable storage devices on external systems. MP.2.121 – Control the use of removable media on system components.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Prevent the remote activation of collaborative devices (webcams, microphones
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ) SC.2.178 – Prohibit remote activation of collaborative computing devices and provide indication of devices in use to users present at the device.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Other considerations for remote work security
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Be aware of phishing and social engineering attempts related to IT support practices
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            . With IT operations having to support remote workers using various tools and methods, more opportunistic threats are being seen, mimicking activities such as password resets/expirations, help desk remote access, and 3rd party vendor solution alerts.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Protect video and teleconference meeting confidentiality.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Settings that require sign-in or have unique meeting IDs/codes help to prevent unauthorized parties from listening in to private communications.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Contact Cytellix:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="mailto:info@cytellix.com"&gt;&#xD;
      
           info@cytellix.com
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/covid19.jpg" length="84238" type="image/jpeg" />
      <pubDate>Tue, 31 Mar 2020 21:26:00 GMT</pubDate>
      <guid>http://www.cytellix.com/covid-19-remote-working-leveraging-nist-cmmc-cyber-guidance</guid>
      <g-custom:tags type="string">Cytellix,News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/covid19.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/covid19.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Bad Actors Capitalizing on Chaos</title>
      <link>http://www.cytellix.com/bad-actors-capitalizing-on-chaos</link>
      <description>The post Bad Actors Capitalizing on Chaos appeared first on Cytellix.</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-3761224.jpeg" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In midst of our reactions to a pandemic, the bad actors find cyber vulnerabilities to attack companies. We saw a recent example over the weekend where The US Health and Human Services Department was attacked. The indication was a DDoS (Distributed Denial of Service) attack intended to slow the networks to prevent dissemination of critical information on COVID19. While the attack did not do significant damage according to reports, it signals that through the Chaos of the COVID 19 pandemic, bad actors will do anything they can to disrupt the country and take advantage of weaknesses inside of any organization.  
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            As both businesses and consumers are focused on the corona virus, contingency planning, stocking up with supplies, social distancing etc. – these distractions are prime hunting ground for the bad actors to entice us to click, respond and generally lower our cyber-guard. Remember the best practices we have been taught and increase your cyber awareness for other behaviors that may be indicators of compromise.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Stay safe!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="/home986b3b40"&gt;&#xD;
      
           www.cytellix.com
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-3761224.jpeg" length="1050807" type="image/jpeg" />
      <pubDate>Tue, 17 Mar 2020 17:20:00 GMT</pubDate>
      <guid>http://www.cytellix.com/bad-actors-capitalizing-on-chaos</guid>
      <g-custom:tags type="string">Cytellix,News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-3761224.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-3761224.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Coronavirus &amp; Cyber Diligence</title>
      <link>http://www.cytellix.com/coronavirus-cyber-diligence</link>
      <description>The post Coronavirus &amp; Cyber Diligence appeared first on Cytellix.</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/blog-Cybersecurity-Framework.jpg" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            As many organizations have made decisions for the health and safety of their employees to move to a telework model, cyber diligence and resilience will be tested. Employees will now log-in from their homes changing the patterns and normal behaviors of the cyber monitoring. These new locations, IP addresses and user behaviors should throw off cyber alerts for your monitoring and security operations centers (SOC). If they are not alerting, then there is an issue with the cyber monitoring and event management of your solution. If they are alerting, then these are “potentially” false positives. Why potentially?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Verify and validate it is the employee and their new location as a bad actor can take advantage of remote user model to get into your data impersonating a remote employee as part of the new alert noise. There should be a significant amount of new noise for cyber monitoring that needs to vetted for both valid user and valid access.  Be diligent during these days of health and safety for both your company and your company employees.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Know who is on your network, always!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="/home986b3b40"&gt;&#xD;
      
           www.cytellix.com
           &#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/blog-Cybersecurity-Framework.jpg" length="81760" type="image/jpeg" />
      <pubDate>Sat, 14 Mar 2020 00:43:00 GMT</pubDate>
      <guid>http://www.cytellix.com/coronavirus-cyber-diligence</guid>
      <g-custom:tags type="string">Cytellix,News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/blog-Cybersecurity-Framework.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/blog-Cybersecurity-Framework.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Always looking for Talented team members</title>
      <link>http://www.cytellix.com/careers</link>
      <description>The post Always looking for Talented team members appeared first on Cytellix.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
    
  
  
                    &#xD;
    &lt;a href="/careers/"&gt;&#xD;
      
                      
    
    
      Always looking for Talented team members
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     appeared first on 
    
  
  
                    &#xD;
    &lt;a href="https://cytellix.com"&gt;&#xD;
      
                      
    
    
      Cytellix
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
    .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 26 Apr 2019 00:00:00 GMT</pubDate>
      <guid>http://www.cytellix.com/careers</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>DoD Supply Chain – THE DEADLINE DELAY IS OVER</title>
      <link>http://www.cytellix.com/dod-supply-chain-deadline-delay-cybersecurity-preparedness</link>
      <description>The deadline for the supply chain to meet compliance with NIST SP 800-171 under Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 was December 31, 2017. As we are all aware, the enforcement and teeth of this deadline was deferred until NOW. 
The post DoD Supply Chain – THE DEADLINE DELAY IS OVER appeared first on Cytellix.</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-220237.jpeg" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The deadline for the supply chain to meet compliance with NIST SP 800-171 under Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 was December 31, 2017. As we are all aware, the enforcement and teeth of this deadline was deferred until 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           NOW
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . By the end of August 2018, all contractors who have been awarded contracts to provide products or services which requires the use of Controlled Unclassified Information (CUI), will be put on notice that enforcement will begin with the new government fiscal year starting October 1, 2018. The obligation of 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           proof
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            is placed upon the supplier, their suppliers and their suppliers. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What does this mean for the supply chain under these contracts? Audits will begin on October 1, 2018 for 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           proof
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            of compliance. The two forms of remedies for failing the audits include a Corrective Action Reports (CAR) and/or loss of contract. The end of the “grace period” has come to an end as well as the request for waivers.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            What will occur in the audit is not merely a documentation exercise. Many consultants provided support that includes preparing documentation and policies; however, they have not done what is necessary to fulfil the Cyber requirements under these contracts. The obligation and requirements to be compliant
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           is not
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            a paperwork exercise. The complete cybersecurity assessment is an aggregation of technology, networking, security, situational awareness, vulnerability awareness, policies, procedures, and the cyber event reporting obligation.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As mentioned above, the cyber-compliance requirements must be backed up by proof. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Proof 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           is defined differently by different people, but, in the end, the burden is on the suppliers to have knowledge, evidence, and awareness of all the cyber controls, implementation, vulnerabilities, real-time cyber events and processes around each control, vs a checklist.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Below are the minimum requirements:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Self-Attestation of the contract obligations for compliance – Attesting to compliance
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
              
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
              2.  System Security Plan with the following provable elements (updated periodically)
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           a.     
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           System Boundaries 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           – Identify the network map, connections and segmentations initially and through the life of the contract
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           b.     
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           System Environments of Operations
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            - Operating Environment where CUI is stored.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            c.     
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How are the security requirements implemented
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            – Both policy, actual evidence and proof of the security requirements are active in real-time.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           d.     
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Relationships with or connections to other systems
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            – Real-time situational awareness of connections and system profile information.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
              3. Plan of Action &amp;amp; Milestones – the detailed plan of cyber gaps and remediation's necessary and updated to show continuous improvements.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
              4. Incident Response Plan – An approved process defined by the DoD for reporting incidents within 72-hours of the event. The 72-hour time limit is 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Not
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            negotiable.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
              5. Be prepared to prove your cyber resiliency with implemented “adequate” cybersecurity controls, cyber event monitoring and processes. If you cannot, your business is at risk from cyber criminals and loss of federal contracts
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The time is now to act, and both prepare for compliance and become cyber prepared. The reality is your company is listed in multiple data base directories that you potentially hold CUI – you are a high risk of being attacked. When you are attacked the nation’s, security is at risk. Become cyber prepared and protect the nation, your business and your employees.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="/home986b3b40"&gt;&#xD;
      
           www.cytellix.com
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-220237.jpeg" length="158367" type="image/jpeg" />
      <pubDate>Tue, 21 Aug 2018 17:37:00 GMT</pubDate>
      <guid>http://www.cytellix.com/dod-supply-chain-deadline-delay-cybersecurity-preparedness</guid>
      <g-custom:tags type="string">Cytellix,News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-220237.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-220237.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cyber Tips &amp; Tricks for SMBs in All Verticals</title>
      <link>http://www.cytellix.com/cyber-tips-tricks</link>
      <description>A while back, I wrote up this list of tips and tricks for customers and partners.  As with everything else, reminders are a great as we have very busy lives and sometimes important items are given a lower priority.  As I was reading this list today, it reminded me to take care of a few personal items on this list.  Send it along to friends, colleagues and family – there are some good tidbits in here.
The post Cyber Tips &amp; Tricks for SMBs in All Verticals appeared first on Cytellix.</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5697261.jpeg" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Never open email from unknown senders
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Right click on email addresses to verify sender’s domain is legitimate, prior to opening an email message. Take a minute and make sure all the spelling and addressing is correct
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            When in doubt about an email and its intentions, call the sender to verify
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Use two step verification / authentication if possible
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            If it’s being offered for free, it’s never free
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Use a modern anti-malware / anti-virus product
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Always update security when requested by legitimate publishers
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Back-up your data, use multiple places/locations.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Back up your data offline when possible
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Do not download applications from unknown publishers or sites
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Never share USB keys/drives
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Do not open attachments in email messages from suspicious senders – verify sender and intentions
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Using mobile devices for browsing is just as risky as laptops for discovering malware and virus’s
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Check what ports are open on your network and their behaviors
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Segment your network for guest and internal users. And, segment IoT devices from the data networks where possible
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Public Wi-Fi networks are very risky for data protection on your devices – use a VPN
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Use a secure password manager for all your unique passwords – some are free
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Never use the same password 2x
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Physical spying takes place as much as digital spying, watch who is looking over your shoulder.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            No one is protected from being hacked, you are, will and have been hacked!
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Set strong privacy setting on your devices – you don’t want to overshare
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Java script in your browser is insecure, disable it!
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Always ask yourself questions about communications sent to you, be suspicious is the best practice
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Use the best browser available from a security perspective, stay aware of exploits of browsers
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Patch, patch, patch!
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Pay attention to mobile app permissions and access, some will access very private, personal and proprietary information you want to remain confidential
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Clean up (delete) apps you don’t use
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Use device passwords to lock and encrypt the data wherever possible – losing a device is painful enough!
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Never leave devices set to default
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Change Wi-Fi passwords often and never repeat them
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Don’t use family names, birthdates, dogs names, and phone numbers as passwords – be unique and complex
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Social media has risks associated with personal information – don’t feed the bad guys information they can use against you
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Inventory and manage your devices and their IP addresses on your network
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Remove any devices that are end-of-life from their manufacturer from your network – they are attack points
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Log-out of services like banking when your done with your business
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Don’t store UID/PW in cookies on devices, just don’t do it
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            IoT is pretty cool, but, make sure you manage these IoT devices with the same care as your computer. Attackers are looking for web cams, thermostats, digital assistants and door locks that are not managed properly
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5697261.jpeg" length="88538" type="image/jpeg" />
      <pubDate>Thu, 22 Mar 2018 21:44:00 GMT</pubDate>
      <guid>http://www.cytellix.com/cyber-tips-tricks</guid>
      <g-custom:tags type="string">Cytellix,News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5697261.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5697261.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cybersecurity Framework – Simplified</title>
      <link>http://www.cytellix.com/cybersecurity-framework-cutting-complexity</link>
      <description>Hopefully you spent the holidays with family and friends instead of reading the latest publication “Framework for Improving Critical Infrastructure Cybersecurity” Version 1.1 Draft 2 published by National Institute of Standards and Technology (NIST) on December 5, 2017.  If you read it, like I did, kudos!  I am not saying it was riveting and should be an episodic series based subscription on Amazon or Netflix, but, there are a few areas that should have every business paying attention.
The post Cybersecurity Framework – Simplified appeared first on Cytellix.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cybersecurity Framework – Cutting Through the Complexity
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5579612.jpeg" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Hopefully you spent the holidays with family and friend’s instead of reading the latest publication “Framework for Improving Critical Infrastructure Cybersecurity” Version 1.1 Draft 2 published by National Institute for Standards and technology (NIST) on December 5, 2017. If you read it, like I did, kudos! I am not saying it was riveting and should be an episodic series based subscription on Amazon or Netflix, but, there are a few areas that should have every business paying attention.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           I am a standards fanboy, as they are public and fair for all. Typically they are measurable and help keep the playing field for enforcement fair. The framework here lets the business take some liberties with aligning processes and technologies to meet conformance and compliance. As industries continue to adopt the cybersecurity framework for compliance, reporting and awareness, businesses are the beneficiary for mitigating risk by implementing. Why? As an example, if your business knows its cyber posture today, it can plan to improve using defined objectives, and implement security policies and controls based upon both business objectives, risks, budgets and need. The benefit to the business is both reduced cyber risk and improved employee productivity. A single breech, malware infection, ransomware event, or patching lapse can cause significant business impacts including loss of revenues, increased expenses and countless hours of productivity that can never be recovered. Using the framework model of “Identify, Protect, Detect, Respond and Recover” helps your organization complete a comprehensive, unbiased, cyber program. Again, as a fan, this is non-vendor specific framework that is neutral on what technology may or will be required.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Let’s take a short journey through the framework and its applicability. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Identify
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Perform a Cybersecurity Assessment to understand assets, roles and responsibilities, policies, procedure, risk management monitoring, gaps and people.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Protect
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Implement and manage access to assets and infrastructure. Verify that all security and integrity can be measured across networks, identities, devices, data and systems based upon user profiles and permissions. Deploy training and awareness internally and externally. Align and test all security policies and procedure with practice.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Detect
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Continuous monitoring and management for cyber events is enabled; Detection of events, 3
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;sup&gt;&#xD;
      
           rd
          &#xD;
    &lt;/sup&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            party connections, unauthorized connections, vulnerability scanning, awareness of cyber events and ownership, and incident response plans and procedure.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Respond
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Develop a communication and response plan to a cyber event. Understand the cyber event impact and recovery plans are developed by severity.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Recover
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Recovery implementations and improvement plans are maintained and updated using lessons learned. Make sure all stakeholders are who are needed to engage in recovery efforts are in constant communication.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Within the framework and organization will develop both knowledge and skills to become cyber aware, prepared and proactive to cyber events. The tactical process to prepare for the framework includes specific tactics that are outlined below.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Assessments
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Assessments vary by type and provider and can be either outsourced or completed internally. The main objective of the assessment is a true, unbiased view of the actual state of cyber controls within an organization. Many of the controls cannot be assessed by just subject matter expertise, but require tools and technology to identify vulnerabilities, cyber gaps and process concern. The assessment should cover all aspects of physical, logical and digital security.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Gap analysis and System Security Plans
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Every assessment should include both a written summary and a detailed analysis including identification of high, medium and low priority vulnerabilities. Also included in the assessment is a network diagram of the current configuration of the organizations infrastructure. It is important to understand and isolate vulnerabilities in the infrastructure. In addition to these, digitally collected vulnerabilities need to be identified and classified by their importance for remediation.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Plan of Action and Milestones (POAM)
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Onc
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           e the assessment is completed, a task oriented plan is needed. Each gap identified in the assessment needs a logical identifier, owner, solution and alignment with any compliance reference. In addition to the above, adding completion dates, 3
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;sup&gt;&#xD;
      
           rd
          &#xD;
    &lt;/sup&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            party technology and dependencies will help drive a budget and or resource conversation. A high quality POAM will help identify internal or external resources, timeframes and project owners making the progress through the cyber framework a systematic approach.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Vulnerability Scanning and Continuous Monitoring
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           There are specialty tools used to capture and maintain a continuous improvement model for cyber preparedness. A cyber assessment and completion of the PAOM or progression through the cyber framework is a continued effort. Cyber is NOT a one and done event in terms of awareness and continuous understanding of cyber events. Vulnerability scanning should be periodic and scheduled; monthly and quarterly works well for most organizations. Cyber monitoring differs from firewall settings, network monitoring and end-point technology services. The difference is in knowledge and awareness of changes networks, devices and connections. All digital assets, known and unknow, need to be monitored in real-time with the ability to see alerts/changes in real-time that can be acted upon before they manifest into significant cyber events.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The framework model does define the stages needed to improve an organizations cyber posture. Without awareness and a plan, including proactive knowledge of cyber events, it’s a roll of the dice and my money is with the house- it’s a loser roll!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/home986b3b40"&gt;&#xD;
      
           www.cytellix.com
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5579612.jpeg" length="192388" type="image/jpeg" />
      <pubDate>Tue, 30 Jan 2018 18:36:00 GMT</pubDate>
      <guid>http://www.cytellix.com/cybersecurity-framework-cutting-complexity</guid>
      <g-custom:tags type="string">Cytellix,News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5579612.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5579612.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cyber Hygiene for the New Year</title>
      <link>http://www.cytellix.com/cyber-hygiene-new-year</link>
      <description>You’ll find some basic hygiene tips here and a more detailed narrative on patching is also included for some holiday reading. Please prepare your cyber posture for 2019 and protect your business.
The post Cyber Hygiene for the New Year appeared first on Cytellix.</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-3987151.jpeg" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Looking back at 2017 and ahead at 2018, it became clear to me that all the great advice for cyber preparedness is not reaching the small and medium businesses. The questions below were asked of me last week in a presentation in Southern Washington, which prompted me to publish this guidance. Basic hygiene below and a narrative on patching is also included for some holiday reading.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What do I do to protect myself? 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           1.   Have your business cyber assessed
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            2.   Change all your passwords to be unique, do not repeat the same password.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            3.   Use complex passwords or a password generator
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           4.   Set up monitoring and alerts of banking accounts for money movement 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           5.   Run modern device anti-virus/anti-malware products on all owned devices
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           6.   Make sure you have you don’t have firewall settings at default and use a next generation firewall.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           7.   Make sure all connected devices are protected and not set to default, segment your data away from IoT devices.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            8.   Learn about phishing and ransomware best practices
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           9.   Don't surf unknown web sites
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            10. If mail looks suspicious or your questioning authenticity- investigate
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Patching narrative
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The issue of deployment of patches or updates by companies is the biggest concern given the public awareness of these broad based cyber/malware attacks. Over the past couple months, the attacks have been based upon the gaps in the “patching” of software or device vulnerabilities. These attackers develop their attacks to automatically detect and exploit these unpatched software or systems that are not updated with the current patch level as the basis for the attack and entrance to a company. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           When a device manufacturer such as a network switch, firewall or router is identified as “end of life” EOL, then it either has a technological market disadvantage or a technical flaw that renders the device vulnerable in certain situations. The manufacturer does two things very well: One, they market the advantages of the next new device with all the capabilities and features that are compelling to “buy” or “upgrade”. Secondly, they publicly identify the flaws and gaps and or vulnerabilities with the strongly urged recommendation to upgrade to the new product to occur. This is normal course of business and does provide full disclosure to their customers.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The other side of this coin, is the same publicly known data used to communicate gaps and flaws is used to create distributed attacks on targeted devices. Once a flaw is known, the hacker communities are also aware and start their targeted attacks to enter an organization through the identified flaws. Yes, we are doing a great job telling the hacker communities how to hack. Call it the unintentional, borderline intentional published hack advisory!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Software patches are similar in respect but much more frequent. Microsoft, Google, WordPress, Apple, Adobe as examples typically call the patches security updates or security bulletins.    Many of the updates are categorized as Critical, Important or Moderate. They also identify the issue either part of the native vendor products or vulnerabilities in 3
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;sup&gt;&#xD;
      
           rd
          &#xD;
    &lt;/sup&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            party applications used by the native applications that can compromise the OEM publisher’s products. The OEM publishers have a significant role to play and this is not trivial work. To be fair, the OEM’s are not intentionally building vulnerable products, they find vulnerabilities over-time in either their native code or 3
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;sup&gt;&#xD;
      
           rd
          &#xD;
    &lt;/sup&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            party licensed code and as a system require an update or patch. In addition, each patch update could in theory also inject new unknown flaws, fix one and then start another. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Why don’t companies patch? Process and procedures say wait? Resources are unavailable? Other projects have priorities? Will the patch break proprietary software/systems that run the business? Knowledge of all available patches? Frequency of patches? Likely some or all of these apply to someone you know. Is it worth it? Given what we know about the magnitude of the impact of these recent attacks, why are you waiting to patch? 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Proper cyber hygiene could save your company and job!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="/home986b3b40"&gt;&#xD;
      
           www.cytellix.com
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-3987151.jpeg" length="924063" type="image/jpeg" />
      <pubDate>Tue, 19 Dec 2017 00:10:00 GMT</pubDate>
      <guid>http://www.cytellix.com/cyber-hygiene-new-year</guid>
      <g-custom:tags type="string">Cytellix,News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-3987151.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-3987151.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Malware &amp; Ransomware: SMB Best Practices</title>
      <link>http://www.cytellix.com/smb-best-practices</link>
      <description>In the wake of the past several weeks of broad and damaging cyber-attacks, it’s important that we talk about proactive measures the small and medium organizations should consider to protect your environment. Many of my colleagues have articulated the damage and origins of the recent attacks: WannaCry &amp; Petya. I find these insights extremely valuable to understand the root and attributions of the malware itself. 
The post Malware &amp; Ransomware: SMB Best Practices appeared first on Cytellix.</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/unnamed+%283%29.png" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In the wake of the past several weeks of broad and damaging cyber-attacks, it’s important that we talk about proactive measures the small and medium organizations should consider to protect your environment. Many of my colleagues have articulated the damage and origins of the recent attacks: WannaCry &amp;amp; Petya. I find these insights extremely valuable to understand the root and attributions of the malware itself. These publicized reports provide all sized organizations context to the magnitude of the current and future damages these organized type attacks can deliver.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The small and medium business sector has the largest threat landscape for cyber-attacks. The potential damages to the hundreds of thousands of businesses in the USA is an alarming statistic. The questions that consistently are asked by the small and medium business is; what should I do to protect my company? And, how can I afford the equipment, software and human resources required to truly become cyber prepared? Good news! There are options and practical real-world solutions available.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Many smaller organizations don’t have the internal resources to research both the industry standards and proprietary models to understand what is the best cybersecurity approach. A best practice is to use a methodical standards-based approach to build cyber awareness, develop a plan to improve and implement a proactive monitoring solution as an appropriate start to cyber preparedness. Noted below are strategic and tactical plans the small and medium businesses should implement immediately.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Strategic recommendations:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Cybersecurity assessment – understand your current posture to identify vulnerabilities
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Gap analysis – a comprehensive view of what needs improvement
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Plan of Action – a detailed, real-world and affordable improvement plan
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Continuous monitoring – become a proactive cyber aware company to know when changes occur
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Tactical recommendations for WannaCry &amp;amp; Petya variants:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Ensure systems are patched and all antivirus programs are up to date
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Implement and determine if backup systems are effectively configured
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Restore only backups that have been securely managed
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Isolate any unpatched systems
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Monitor all networks and device connectivity
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="/home986b3b40"&gt;&#xD;
      
           www.cytellix.com
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/unnamed+%283%29.png" length="60345" type="image/png" />
      <pubDate>Wed, 08 Nov 2017 00:58:00 GMT</pubDate>
      <guid>http://www.cytellix.com/smb-best-practices</guid>
      <g-custom:tags type="string">Cytellix,News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/unnamed+%283%29.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/unnamed+%283%29.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Trick or Treat – Ransomware is a Trick disguised as a Treat</title>
      <link>http://www.cytellix.com/trick-treat-ransomware-trick-disguised-treat</link>
      <description>Ransomware is also getting in to business systems through the vulnerability of operating systems and software. Targeted attacks are being delivered on outdated security software or system software.
The post Trick or Treat – Ransomware is a Trick disguised as a Treat appeared first on Cytellix.</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/blog-trick-or-treat.jpg" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This time of year, causes me to think about cyber lessons learned, malware related questions from customers and colleagues and all the ghoulish activities we have witnessed in 2017. We have seen obvious phishing mails that are clearly spoofed email addresses or URL’s and have provocative messages to drive users to click. These provoke the users to click the message, open an attachment or a click infected URL that cause the execution of the malware. Another common way to be become infected is through compromised websites that can trigger the installation of an unintentional program download.  These are “Tricks” used to cause a user to change their normal behaviors. As we have more and more awareness of Phishing and Ransomware, our ability to be “Tricked” has been reduced, but not eliminated. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Ransomware has now become synonymous with Phishing. The two attack types are merged together into an imbedded encryption attack. The statistics are showing that over 90% of all Phishing attacks now contain Ransomware encryption. The technique of the Phishing mails is changing in the business world to draw employees in and cause the attack to be successful. The emails that are now seen include a personalized message with a correct salutation that includes subjects of interest by job category. These are effective attacks and are gaining popularity. Sophistication of social engineering is improving in these types of attacks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Ransomware is also getting in to business systems through the vulnerability of operating systems and software. Targeted attacks are being delivered on outdated security software or system software. These types of attacks are broad and successful as we have seen over the past few months. The Malware enters the organization via targeted attacks of known vulnerabilities and they migrate through systems to infect the entire network and its connected devices. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Ransomware works in a very orchestrated manner. Once the ransomware program has been executed it starts communicating with its host to acquire an encryption key. This happens very quickly. Once the program has its key it encrypts the data on a system. The data is then unusable. Encrypted data can “typically” be recovered using the decryption key, but there are no guarantees given the source of the attack. Once the decryption key is delivered back to the program, the process can then be reversed. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The best preparation and organization can take follow many common practices. From updated end-point protection products, to stringent data back-up procedures to patching and updating of software. These along with a cybersecurity process of Identify, Protect, Detect, Respond and Recover are extremely valuable for any business. Phishing/Ransomware Employee education and training continues to be a highly valuable process to do on a continual basis. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In addition to developing a Cybersecurity process and following a standardized framework, vulnerability scanning and monitoring network behavior are must have proactive countermeasures. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Lastly, nothing is guaranteed to keep your business safe, but, reducing your attack surface area will be worth the investment. The ability to know in real-time if an attack is in process and the knowledge to remediate or immediately take the suspect system off-line, can save you significant time, energy and money.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/home986b3b40"&gt;&#xD;
      
           www.cytellix.com
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/blog-trick-or-treat.jpg" length="50734" type="image/jpeg" />
      <pubDate>Tue, 31 Oct 2017 20:37:00 GMT</pubDate>
      <guid>http://www.cytellix.com/trick-treat-ransomware-trick-disguised-treat</guid>
      <g-custom:tags type="string">Cytellix,News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/blog-trick-or-treat.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/blog-trick-or-treat.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Defining CUI – Controlled Unclassified Information for the Manufacturing Segment</title>
      <link>http://www.cytellix.com/defining-cui-controlled-unclassified-information</link>
      <description>The definition of CUI, or Controlled Unclassified Information, by the Department of Defense is challenging for most small and medium manufactures to grapple. 
The post Defining CUI – Controlled Unclassified Information for the Manufacturing Segment appeared first on Cytellix.</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/blog-cui.jpg" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The definition of CUI, or Controlled Unclassified Information, by the Department of Defense is challenging for most small and medium manufactures to grapple. The NIST Frameworks for Cybersecurity SP800-171 have defined CUI under the context of “Protecting Controlled Unclassified Information (CUI) in Nonfederal Information Systems and Organizations.” The security requirements of 800-171 apply to all components of nonfederal systems and organizations that process, store or transmit CUI, or that provide security protection for such components. I will walk through the various standards and definitions to highlight the specifics that affect our manufacturers who need to meet compliance with the NIST cybersecurity guidelines. As this background currently applies to commercial manufacturing under DOD contracts, the guidance and definitions are in either draft or consideration for other verticals, including financial services, healthcare, food safety, automotive and other related verticals.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What is CUI? According to the National Archives, “Only information that requires safeguarding or dissemination controls pursuant to and consistent with law, regulations, and government-wide policies may be CUI. this excludes all information that is classified under Executive Order 13526 of December 29, 2009, or the atomic Energy act, as amended.” In commercial manufacturing, this would be anything other than COTS (Commercial Off-The-Shelf) and includes modified COTS products. The summary and extension is to any organization that provides a product or solution that is designed for government or modified for government, the information associated with such would be considered CUI. CUI is: (i) provided to the contractor by or on behalf of DoD in connection with the performance of the contract; or (ii) collected, developed, received, transmitted, used, or stored by or on behalf of the contractor in support of the performance of the contract; falls in any of the following categories: (i) controlled technical information, (ii) critical information, (iii) export control (iv), any other information, marked or otherwise identified in the contract, that requires safeguarding or dissemination controls pursuant to and consistent with law, regulations, and government-wide policies (e.g., privacy, proprietary business information).
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            How do you protect CUI? Provide
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           adequate security
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            to safeguard covered defense information that resides on or is transiting through a contractor’s internal information system or network. Adequate security is defined as implementation of NIST SP800-171 that include the 14-controls for cybersecurity and is required by 12/31/2017. Compliance with 800-171 is considered 100 percent complete with any waivers or deviations approved by the DOD CIO. An organization can demonstrate through Plans of Action (POAM) and System Security Plans (SSPs) that they are in-progress as part of a contractor’s risk management decision of CUI protection by their supply chain.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cyber incidents are another component of the compliance or CUI program. A cyber incident is an action(s) taken through the use of computer networks that results in a compromise or an actual or potentially adverse effect on an information system and/or the information residing therein. “Compromise” means disclosure of information to unauthorized persons, or a violation of the security policy of a system, in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object, or the copying of information to unauthorized media may have occurred.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What steps must be taken if a cyber incident occurs? Affected parties must:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Review contractor network(s) for evidence of compromise of covered defense information using contractor’s available tools including, but not limited to, identifying compromised computers, servers, specific data and user accounts.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Identify covered defense information that may have been affected in the cyber incident.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            According to DFARS Clause 252.204-7013(c)(1), they must rapidly report (within 72 hours of the discovery of an incident) directly to DoD and the subcontractors need to provide the incident report number, automatically assigned by DoD, to the prime Contractor (or next higher-tier subcontractor) as soon as is practical.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The need for critical infrastructure and supply chain cyber improvement has now become a requirement. We are seeing more and more cyberattacks on this market segment that result in the rapid and “unknown” theft of intellectual property, data and designs. Copied and counterfeit products, parts and infrastructure cause damage to the US economy.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The extension of the standards to other vertical markets is not a question of “if,” but a question of “when.” Prepare to adopt the NIST framework in every vertical market as a measurable, identifiable and comprehensive approach to understanding cyber posture of any organization.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           *Nationalarchives.gov
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           **DFARS Clause 252.204-7012(c)(1)
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="/home986b3b40"&gt;&#xD;
      
           www.cytellix.com
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/blog-cui.jpg" length="61606" type="image/jpeg" />
      <pubDate>Mon, 11 Sep 2017 23:36:00 GMT</pubDate>
      <guid>http://www.cytellix.com/defining-cui-controlled-unclassified-information</guid>
      <g-custom:tags type="string">Cytellix,News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/blog-cui.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/blog-cui.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Corporate Cyber Incident Response Plan – Do You Even Have One?</title>
      <link>http://www.cytellix.com/cyber-incident-plan</link>
      <description>I was messaging with a very good friend and colleague this week and we started chatting about incident response plans. We noted that most people have a plan in place at home; he raised examples around personal security elements such as home alarms, dogs, door locks and cameras. 
The post Corporate Cyber Incident Response Plan – Do You Even Have One? appeared first on Cytellix.</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/incendent-response-plan.jpg" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           I was messaging with a very good friend and colleague this week and we started chatting about incident response plans. We noted that most people have a plan in place at home; he raised examples around personal security elements such as home alarms, dogs, door locks and cameras. The comment that resonated with me most was, 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           you know what to do when you come home and your home has been burglarized
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . Call the police, insurance company, etc. He went on to pose the question, 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           what about when your company is electronically burglarized?
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            For most organizations, that question is met with silence.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           While burglary in the workplace takes on many forms, we will focus on burglary in the form of cyberattacks. The attacker is “stealing” information from your company for monetary purposes. Yes, the cyberattack is intended to take something from you: data, money or both. Cyber-attackers work systematically and operationally efficiently to pick either high-value targets or high-probability targets to extort what they are targeting—data, intellectual property, personal identifiable information or cash extortion from a ransomware event. It’s a business and the value to the attacker is what they take for future gains or currency to potentially give you back what they have access to or control of. The results of this are highly distracting, expensive and potentially severely impactful to the business.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Circling back to the concept of corporate cyber incident response, what is your answer? Is the first step to call the authorities and FBI? Is it to pay the ransom? Is it time to deploy your Disaster Recovery (DR) policy? Do you even have a DR plan? Have you identified your critical data?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What exactly is the FBI’s role in cyber?
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            The FBI’s role is to hunt down the “bad guys” and prosecute them, plain and simple. Their role is not to recover your assets, cash or data. Should you call the FBI if you are burglarized (cyberattacked)? Absolutely! We want to shut down as many cyber criminals as possible. Should you pay the ransom? Well, that depends—do you have a data recovery plan implemented that remains unscathed by the encryption tactics used by the attacker? If yes, why would you pay? Sometimes organizations need to make a time vs. money decision, as the time to recover may exceed the threshold a company can accept for their business. Law enforcement suggest not paying the ransom, but your business objectives need to drive your decision.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Many organizations talk about the topic of incident response, but very few have a realistic plan. Some suggestions that can help include: building a plan that includes recovery steps, using realistic scenarios and identifying leaders within your company who will drive those decisions. Have a true plan of action that is executable. Do a few tests of the plan “dry run” a few scenarios. Be prepared, be ready, be diligent—the odds prove that this will happen to your company at some point. The small and medium business market is the largest potential target, while also the least prepared.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Start today!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="/home986b3b40"&gt;&#xD;
      
           www.cytellix.com
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/incendent-response-plan.jpg" length="12266" type="image/jpeg" />
      <pubDate>Thu, 24 Aug 2017 23:38:00 GMT</pubDate>
      <guid>http://www.cytellix.com/cyber-incident-plan</guid>
      <g-custom:tags type="string">Cytellix,News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/incendent-response-plan.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/incendent-response-plan.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Artificial Intelligence (AI) Cybersecurity: It’s All About Behavior!</title>
      <link>http://www.cytellix.com/artificial-intelligence-cybersecurity-behavior</link>
      <description>The latest leading-edge data intelligence topics referred to as Artificial Intelligence (AI), Machine Learning (ML) and, Artificial Neural Networks (ANN) are currently experiencing significant venture and corporate capital investments. 
The post Artificial Intelligence (AI) Cybersecurity: It’s All About Behavior! appeared first on Cytellix.</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/blog-ai-intelligence-a7177501.jpg" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The latest leading-edge data intelligence topics referred to as Artificial Intelligence (AI), Machine Learning (ML) and, Artificial Neural Networks (ANN) are currently experiencing significant venture and corporate capital investments. Some of the advantages of ingesting large quantities of data and creating a corpus of knowledge to draw insights are very interesting for complex subjects such as cybersecurity, healthcare and financial services. The use cases of AI in healthcare such as DNA/genome research are truly captivating to read. The parallels to cybersecurity research and respective knowledge base for predicting and analyzing data will be step-functions of change needed to understand the data collection and interpretation of threats. The application of any form of AI includes a “people factor,” as directly linked to both ends of a “cyber activity.” A “cyber event” is started by a person and the resolution is implemented and managed by the same.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The behavior part of cybersecurity also involves people, but machine behavior plays a significant role in cyber events. For example, if we can measure a baseline of machine behavior that is “known good,” then we can react—potentially in real-time—to machine changes in behavior. There are many parameters to consider and behaviors that may be considered non-issues to filter; however, having a system of behavioral analytics under the category of AI/ML/ANN brings data-driven decision making.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           A few scenarios to outline this include known devices on the network or IoT devices changing their state. In the first case of known devices, this has been a topic we have been discussing in the security space for a very long time. Products and technologies have been built for attestation, key management and device authentication—to capture a few categories. As we move up a level from the cryptography space to understanding the metadata a device produces, we can measure changes, arrival, departure and state. By observing anything with an IP address in relationship to the context of its metadata, we can filter “good” and “bad” activities, behaviors and changes. If a known device comes on the network at 8 am on Monday normally, but an unknown device comes on the network at 3:00 am, we can create an action to change that behavior and thus become proactive in our cyber preparedness. Alternately, if a known device that was once considered “good” starts talking to a “bad” actor site or shows a change in its metadata that is considered out of policy/standard, then actions can be taken to quarantine or remediate accordingly.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In the second example of IoT devices changing their state, we have seen this with IP cameras, and medical devices. The potential case of industrial systems being taken over by the “zombie robot apocalypse” is not as far removed from reality as one might think. Hackers can exploit flaws and create subtle changes to industrial control systems, which could be dramatic in scale or event. I am not suggesting that the machines will take over the world, but I am suggesting close monitoring of IoT devices for behavioral changes that could indicate the presence or possibility of a wider scale issue.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As an industry, we can start to move from a reactive to a proactive state in the category of cyber preparedness. A real-time approach to monitoring device behaviors could reduce cyber event time to discovery from the current industry average of 256 days. The cost of discovery time is escalating every year. Our small and-medium businesses cannot afford the costs of remediation and losses that accompany a cyber event. The statistics of survival for SMBs in a cyber event estimate that roughly 60 percent or 6 out 10 will not be in business in six months.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The current state of cybersecurity necessitates the establishment of continuous monitoring practices—to monitor both known devices on networks and IoT devices changing their state. The innovations of artificial intelligence (AI), machine learning (ML) and artificial neural networks (ANN) are paving the way for a proactive cyber approach.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="/home986b3b40"&gt;&#xD;
      
           www.cytellix.com
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/blog-ai-intelligence-a7177501.jpg" length="396693" type="image/png" />
      <pubDate>Wed, 16 Aug 2017 22:50:00 GMT</pubDate>
      <guid>http://www.cytellix.com/artificial-intelligence-cybersecurity-behavior</guid>
      <g-custom:tags type="string">Cytellix,News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/blog-ai-intelligence-a7177501.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/blog-ai-intelligence-a7177501.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>“Flipper” role in protection of our resources – it’s an IoT fish story!</title>
      <link>http://www.cytellix.com/iot-fish-story</link>
      <description>Many may remember the TV series, “Flipper.” For those who do not remember, the theme and plot is as follows: Flipper, a bottle-nose dolphin, helps to protect his lagoon park and preserve its wild inhabitants. He is instrumental in apprehending criminals and thugs in the park. How does this story draw parallels to cybersecurity?
The post “Flipper” role in protection of our resources – it’s an IoT fish story! appeared first on Cytellix.</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/blog-flipper-iot.jpg" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Many may remember the TV series, “Flipper.” For those who do not remember, the theme and plot is as follows: Flipper, a bottle-nose dolphin, helps to protect his lagoon park and preserve its wild inhabitants. He is instrumental in apprehending criminals and thugs in the park.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How does this story draw parallels to cybersecurity?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This past week, an unnamed North American casino experienced a cybersecurity breach via a fish tank. The casino’s self-cleaning fish tank, programmed via sensors to monitor water temperatures and fish feeding schedules, was targeted by hackers. Through the fish tank system, the cyber thugs broke into the casino’s computer network and downloaded sensitive data to a Finland location.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Connecting the dots of this story back to “Flipper,” the idea of observing and monitoring one’s environment is vitally important. Like Flipper—whose role was to apprehend criminals through observation and data collection—we must remain vigilant, and can no longer blindly trust even the most innocent of devices, such as programmed fish tanks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Fish tanks are now IoT devices on our networks and, as seen in the case of this casino, can create an open door for clever cyber thugs. Today’s cyber thugs and criminals leave breadcrumbs of information that we can collect to understand the risks associated with certain IT decisions. The same advice and best practices apply to fish tanks as they do to any other sensor on our networks. Understand, Monitor, Prevent and Segment to protect your most critical assets: DATA!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://money.cnn.com/2017/07/19/technology/fish-tank-hack-darktrace/index.html" target="_blank"&gt;&#xD;
      
           http://money.cnn.com/2017/07/19/technology/fish-tank-hack-darktrace/index.html
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="/home986b3b40"&gt;&#xD;
      
           www.cytellix.com
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/blog-flipper-iot.jpg" length="91281" type="image/jpeg" />
      <pubDate>Wed, 26 Jul 2017 23:59:00 GMT</pubDate>
      <guid>http://www.cytellix.com/iot-fish-story</guid>
      <g-custom:tags type="string">Cytellix,News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/blog-flipper-iot.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/blog-flipper-iot.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Where are cybersecurity threats coming from?</title>
      <link>http://www.cytellix.com/cybersecurity-threats-come-from</link>
      <description>There has been a lot of recent news and discussion about several malware variants that have been defined as ransomware attacks. There are and have been other damaging malware attacks, but ransomware popularity is currently very well publicized.
The post Where are cybersecurity threats coming from? appeared first on Cytellix.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           There has been a lot of recent news and discussion about several malware variants that have been defined as ransomware attacks. There are and have been other damaging malware attacks, but ransomware popularity is currently very well publicized.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Ransomware attacks are not simple but are commonplace in the market today. These attacks typically find their way into an organization through social engineering. To be more specific, the malware is embedded in an attachment as an executable. There are several outcomes from ransomware that we have seen thus far: an individual machine is encrypted and the decryption key is held for ransom by the attacker and a currency request of a “Bitcoin” is requested to decrypt the machine in question. The nastier variants can traverse from machine to machine through the network, creating a systemwide infection. This attack causes severe networkwide shutdowns, causing an organization to recover through more significant ransom payments, or if the company was prepared, backup remediation steps are taken.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The availability of targets for ransomware attacks is almost unlimited, with small and medium businesses (SMBs) being the most vulnerable. Most SMBs are not well-equipped to handle these attacks. There are a few typical dilemmas the SMBs face: 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What is a bitcoin and how do I get one/them? We did not prepare our network and back-up processes to remediate the problem.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            Lastly, law enforcement does not recommend payment to the ransom and there is no guarantee that the attacker will actual provide a legitimate decryption key.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The other type of attack—less publicized but equally damaging—is the “insider threat,” wherein the attacker is currently or was previously authorized to work inside your organization. These individuals can cause incalculable damage to your company. As an example, these can be system level attacks or result in losses of intellectual property. The insider threat is as complex to detect and remediate as an external attack. The differentiator here is the insider knows the weaknesses and knows where to find the most valuable information. As with external threats, experts recommend both employee training and monitoring capabilities to detect real-time behavioral changes.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Some additional processes to help SMBs monitor their employees, networks and behaviors to identify insider and external threats include:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Developing and enforcing policies for access to information systems
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Monitoring and auditing inappropriate access – remediating upon discovery
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Enforcing authentication and limited login attempt processes
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Monitoring printers, downloading (large), queries and email
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Deploying real-time networks monitoring for flow, files, connections, ports and suspicious IPs
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Managing identities of current and past employees
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="/home986b3b40"&gt;&#xD;
      
           www.cytellix.com
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/markus-spiske-KDBWMSq9wh0-unsplash.jpg" length="269601" type="image/jpeg" />
      <pubDate>Tue, 18 Jul 2017 23:08:00 GMT</pubDate>
      <guid>http://www.cytellix.com/cybersecurity-threats-come-from</guid>
      <g-custom:tags type="string">Cytellix,News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/markus-spiske-KDBWMSq9wh0-unsplash.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/markus-spiske-KDBWMSq9wh0-unsplash.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>The Background on Industry Cybersecurity Standards – NIST, CSET, DFARS</title>
      <link>http://www.cytellix.com/background-industry-cybersecurity-standards</link>
      <description>How to best understand the Cybersecurity guidance and volumes of information is an ominous challenge? The foundational cybersecurity work produced by NIST (National Institute for Standards and Technology) is  a comprehensive cybersecurity review. 
The post The Background on Industry Cybersecurity Standards – NIST, CSET, DFARS appeared first on Cytellix.</description>
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/AdobeStock_198547809_Preview.jpeg" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How to best understand the Cybersecurity guidance and volumes of information is an ominous challenge? The foundational cybersecurity work produced by NIST (National Institute for Standards and Technology) is a comprehensive cybersecurity review. Rather than diving too deep in to NIST and the regulatory nature of the definition of classified vs unclassified information and its protection, I will touch on the value of measuring a commercial organizations cybersecurity posture.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The recommended NIST standards, should you be interested to read, are noted as NIST SP 800-171 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://csrc.nist.gov/publications/drafts/800-171/sp800_171_draft.pdf" target="_blank"&gt;&#xD;
      
           http://csrc.nist.gov/publications/drafts/800-171/sp800_171_draft.pdf
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , published October 18, 2015 identifies a couple very useful tools and premises for measurements. One tool, that is very useful is the CSET (Cyber Security Evaluation Tool) 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://cset.inl.gov/SitePages/Home.aspx" target="_blank"&gt;&#xD;
      
           https://cset.inl.gov/SitePages/Home.aspx
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , which is a self-test, that any organization can use for “free.” While this tool is comprehensive in nature, it does require the user of the tool, to have an in-depth IT and Cyber background to accurately answer the 109 technical questions. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The second very useful part of the NIST publication is the breakdown of measurements into the specific 14-controls: Access Control, Awareness and Training, Auditing and Accountability, Configuration Management, Identification and Authentication, Incident Response, Maintenance, Media Protection, Personnel Security, Physical Protection, Risk Assessment, Security Assessment, System and Communication Protection, System and Information Integrity. By accurately measuring these controls in both a self-test environment (CSET) and using network scanning/situational awareness tools, an organization can get a true grade of their cybersecurity posture to uncover looming vulnerabilities. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The tool (CSET) produces a private result that are defined as a percentage out of 100%, with 100% being equal to compliance. The commercial customer can be measured against a publicly available industry standard, that has been architected to look at a company’s posture without bias. The meaning is to use an industry standard, and by definition, an industry standard is not proprietary. The consulting, technology and solutions market typically use a proprietary methodology to assist in assessments. However, leveraging the standards will give your organization a measurable outcome and baseline for improvements.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Now that we have reviewed the foundations, putting this into practice and having a vision of the effect on your company is an important discussion. Today, any organization, that supplies the federal government with product, solutions or services under a DOD contract, MUST BE COMPLIANT BY 12/31/2017. This date is non-negotiable. Organizations can self-assess or outsource the entire process to cyber experts. There are a few other requirements for compliance beyond providing the 100% System Security Plan, which include a Plan of Action and Milestones (your cyber improvement plan), a gap analysis (what are my company challenges), continuous monitoring and cyber incident reporting processes. The commercial market cyber need is increasing daily, with both compliance, business continuity needs and basic preparedness.  The standards approach is a very good methodology and starting place. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Other industries that will see changes for compliance in variations of this standard include: Healthcare, Financial Services, Food Safety, manufacturing and the Small and Medium Businesses (SMB’s). Here are some great references to see where the future of Cybersecurity preparedness is heading.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            DFARS 252.204-7012 referenced as contract language for federal NIST 800-171 - designed for non-federal information systems (commercial)
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            NIST 800-53 cybersecurity framework for Federal information systems
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Cybersecurity Framework for critical infrastructure – references NIST 800-53
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Health Care Industry Cybersecurity Task Force recommends NIST Cybersecurity framework
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="/home986b3b40"&gt;&#xD;
      
           www.cytellix.com
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/AdobeStock_198547809_Preview.jpeg" length="60768" type="image/jpeg" />
      <pubDate>Wed, 05 Jul 2017 23:17:00 GMT</pubDate>
      <guid>http://www.cytellix.com/background-industry-cybersecurity-standards</guid>
      <g-custom:tags type="string">Cytellix,News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/AdobeStock_198547809_Preview.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7ed93a69/dms3rep/multi/AdobeStock_198547809_Preview.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
  </channel>
</rss>
